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"}], 0x11f8}, 0x448a0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) 23:07:21 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x39, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)=0x1) 23:07:21 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x18, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d00000005a0ba47ced25b479500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) openat$cgroup_int(r2, &(0x7f00000005c0)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffff5d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x90105, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000400), 0x4}, 0x0, 0x0, 0x10000}, r3, 0xffffffffffffffff, r1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x7) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000540)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0x20, 0x6, 0x2, 0x6, 0x0, 0x3, 0x88000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6079, 0x4, @perf_config_ext={0x3, 0x5}, 0x800, 0x80, 0x7d22, 0x7, 0x200, 0x100, 0x1f}, r3, 0xf, r7, 0xa) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r8, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000300)=r8, 0x4) 23:07:22 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x3b, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r3, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x1000, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x0, 0x2, 0xfff}, &(0x7f00000002c0)=0xff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000040)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map_val={0x18, 0xa, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xffffffff}, @func], &(0x7f0000000080)='syzkaller\x00', 0x7f, 0x9, &(0x7f00000000c0)=""/9, 0x40f00, 0x8, [], 0x0, 0xe, r2, 0x8, &(0x7f0000000100)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x9, 0x81, 0x1}, 0x10, r4, r0}, 0x78) 23:07:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7aba6968adffffff79a4f0ff00aee3244da35548000000b7060000ffffffbc0568a8e685dfde62e2bcff2d6405000000000065040400050000006a0ad1e321e5c00404000001007d60b7030000000006e810ba092e977b00"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = perf_event_open$cgroup(&(0x7f0000000440)={0x5, 0x70, 0x1, 0x6, 0x5, 0x40, 0x0, 0x0, 0x94040, 0x5, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x57ec, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x402, 0xfffffffffffff0db, 0x8, 0x3, 0x0, 0xca}, r2, 0xc, r3, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000004c0)='cpuset\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f0000000400)=""/152, 0x98, 0xffffffffffffffff}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffe4b, 0x10, &(0x7f0000000000), 0x10, r1, r0}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:22 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x19, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000080)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 23:07:22 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x3e, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:22 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r1, r2, 0x1, 0x2}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='pids.current\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x70, 0xaf, 0x5b, 0x80, 0x76, 0x0, 0x6, 0xb60cda9074a258ec, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x359, 0x80000001}, 0x1000, 0x2, 0x0, 0x0, 0x4aa, 0x2, 0x3}, r4, 0xffffffffffffffff, r5, 0x1) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r6, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r3, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r7, r8}, 0x78) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r7, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x18, 0x5, 0x5, 0x0, 0x181, r0, 0x9, [], r1, r9, 0x0, 0x4}, 0x3c) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r10, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0xffff, 0x1}, 0xc) 23:07:22 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x1a, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:22 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0xfffffffffffffef0, &(0x7f0000000400)="b9ff031a000d6940b89e40f032ead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x3e1, 0x0, 0x0}, 0x40) socketpair(0x8, 0x8000f, 0x3f, &(0x7f0000000300)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702004003000800bfa300000000000007030000001a5aff7a0af0fff8ffff0000ffffffff2d6405000000000065040400050000000404000001007d00fe00000000850000000d000000b70000000000000095cd7800"/101], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x2fc, 0x29, &(0x7f00000006c0)="b9ff031a000d698c000000002cead5f257ee41dea43e631542fb977d48", &(0x7f00000000c0)=""/41, 0x8001, 0x0, 0xfffffffffffffeb5, 0x185, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00', 0x0, 0x4}, 0x10) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0xb, 0x201}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0xffffffb9, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x325) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)=0x1000) write$cgroup_int(r1, &(0x7f0000000080)=0x2, 0x12) 23:07:22 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x1b, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:22 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x63, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x14, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000603000002bfa30000000000000703000000eeffff7a0af0fff8ffffffcd2c164fccc4721e85ced00b611379a4f0ff00000000b7060000ffffffff2d6406000000000000000400050000b9d8289284177b621f6f9164069b38000404020001007d60b7030000000000007a0a00fe00000000850000000d000000b70007c63f3a4614accc7229e620b7523ef1165668635985ad60b5c2d1612457fdd21f61a7665063"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x78) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000140)='memory.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:22 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa3ffeb22e1775088b5000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000003000000bf950000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7810100ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000000000950000000000000065d114389908b8454ccb555e435de352523b3bdfd81bee1381ab6f74731eeae6aa48ff9df175de51000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000380)={0x4, 0x70, 0xff, 0x7, 0x0, 0x7f, 0x0, 0x6, 0x4400, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x4, @perf_config_ext={0x2, 0x765e}, 0x4000, 0x0, 0x3f, 0x7, 0x2, 0x7, 0x2}) 23:07:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x263, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0xda, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:23 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x1c, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:23 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x4e22, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000080)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x200000000000026e, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r4, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r5, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r3, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r5, r6}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x13, 0x6, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@map, @call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000280)='GPL\x00', 0x5, 0x1000, &(0x7f0000000600)=""/4096, 0x0, 0x8, [], 0x0, 0x9, r2, 0x8, &(0x7f00000002c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x10001}, 0x10, r5}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000180)='./file0\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r8, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x3b, 0x7, 0x9, 0xff, 0x0, 0x2, 0x1b010, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3c, 0x4, @perf_config_ext={0x404, 0x4}, 0x102, 0x8, 0xfffffff7, 0x0, 0x7, 0x8, 0x3f}, 0x0, 0x7, r8, 0xb) 23:07:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000c5060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000000000950000002d0bf464"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = openat$cgroup(r3, &(0x7f0000000480)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x3, 0x70, 0x7, 0xd4, 0x3f, 0x6, 0x0, 0x1, 0x8, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000300), 0xc}, 0x10000, 0x5, 0x0, 0x0, 0x3f, 0x9}, r4, 0x4, 0xffffffffffffffff, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0xfffffffffffffe2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x4200, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000ee6944b9e892a0a29e9fe6ffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='syzkaller\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:23 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x1a000, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2000000000000216, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003000000bfa300ebebdaf9bc5da9bd54a6f521da1ff9000000040007030000ff00000000b7060000ffffffff2d640500000000006504000005002a8860a100000401000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x200000}, 0x0, 0x10, &(0x7f0000000000)={0x0, 0xc}}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:23 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x1d, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffff01000000ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d6000000000000000087a0a3039efbfa0a8d30c25cf8a1b39f8ec00fe00000000850000000d000000b7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:23 executing program 5: r0 = socket$kcm(0x29, 0x3, 0x0) recvmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000080)=""/255, 0xff}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000000180)=""/88, 0x58}], 0x6, &(0x7f0000000440)=""/63, 0x3f}, 0x22002) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:23 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x40000, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500006b00006504040005f3ffff0304000001009a60b7030000000000007a0a00fe00000000010000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x240}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0x9c, 0x25, &(0x7f0000000040)="e144e2265304ed99d28415cd4800b2b8e3355d8264fda70d93fe9c7e716e73a1a6f23fea7bc204f4eca71a365afb81b13548de5920cc1fc90eb568d1e1ff2d9603f25479b3a6af839c8dd4fa606798ae97005e8e818c6536e3605e1309a07f93f88e6a95d5c5581f2813b4ec25582ca0142bf58e7601511692cbd8147231f1ce8f6812b07c8dfa94c3bd7e961a1c51b40f30bf5ede41404150966cdb", &(0x7f0000000100)=""/37, 0x6, 0x0, 0x77, 0x5c, &(0x7f0000000140)="a5fc94f7f5390aa0217cd55cc4048a1426090a07e13de758dc18d3992fdfd81686878561ad3e20fc76dba7dee1a41ce18a07ed7bc042ebeb042db86cb636c834cd506a097077a252473bada824b215e0e0ffb2657f4b3de8281c38445ada126a517de68940ea7243df5427e5ca23854ba3543ab36a995c", &(0x7f0000000280)="ae60b10156a3cc08b176d44d079dc238c46f09fbb19ff0a54a5808e857745aaf137c49a3de5add98c60aea6a2ba114d72eba400058b293c2a9b77c03bb7567836874ea0d9616a6d1f58be99eb4c0ff80b53dc58ed6108bbbe70e6e91"}, 0x3b9) 23:07:23 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x1e, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, r1, 0xe, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x65) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000b7a30000010000000000000000ef05ff7a0af0fff8ffff007aa4f0ff02000000b7ebff00ffffffff2d64050000000000650404000500000004040000010000008b5fe4e3d6f8b90800850000002f000000b7000000000011009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xfffffffffffffe99, &(0x7f0000000400)="ff871b965b1da0500c0727ee7afb", 0x0, 0x0, 0x0, 0xffffffffffffff1b, 0x4dbda002b6346e23, &(0x7f0000000040)="0700a1a9506066f4224ec9558c", 0x0}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080)="4eaaa25040f47447df5e61bb16a48ea853b6404aeb7b6ea9fdc5237bc9de84"}, 0x20) 23:07:24 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040005000000040400000100fd60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x8010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x2}, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, r2, 0x8, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x10000, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r6, &(0x7f00000081c0)={&(0x7f0000007d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000500)=""/202, 0xca}, {&(0x7f0000000600)=""/117, 0x75}, {&(0x7f0000000700)=""/123, 0x7b}, {&(0x7f00000007c0)=""/169, 0xa9}, {&(0x7f0000000400)=""/50, 0x32}, {&(0x7f0000000880)=""/118, 0x76}, {&(0x7f0000000900)=""/242, 0xf2}], 0x1, &(0x7f00000080c0)=""/200, 0xc8}, 0x120) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000008200)=r7) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r4, &(0x7f0000000300)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="2da5ec2a5970696458203b6d1c90cd8079202db2f14f87ee3ff73579efbb64ba6c314965656daa62fe08"], 0x16) 23:07:24 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0xfe5e0002, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000d5060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:24 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x21, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:24 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0200000000000000000000000000000005"}], 0x28}, 0x0) 23:07:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/80, 0x50}, {&(0x7f0000000140)=""/139, 0x8b}, {&(0x7f0000000440)=""/154, 0x9a}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x4, &(0x7f0000000500)=""/126, 0x7e}, 0x40000000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000580)=r2, 0x4) 23:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000010000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:24 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x22, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:24 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0300000000000000000000000000000005"}], 0x28}, 0x0) 23:07:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x2, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff53, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x3f}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:24 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x23, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="00000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050100000004000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000dd009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x3ce) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000080)=r0) 23:07:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES16=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:25 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0400000000000000000000000000000005"}], 0x28}, 0x0) 23:07:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000658e55eaedda0df3ff7a05f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000000300000000000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000440)={0x0, 0xa}}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x168, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060003ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x2d6, 0x0, &(0x7f0000000400)="ff871b965b1da0500e079e0e3d0e", 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffed3, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:25 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x24, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300000000000007030000f4edffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405a88d00000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r2, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x3f, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x7, 0x3, 0xfffffa9d}, &(0x7f0000000180)=0x5e3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x5}}, 0x10) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x16}, 0x10) 23:07:25 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0500000000000000000000000000000005"}], 0x28}, 0x0) 23:07:25 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r0, r1, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r2}, 0x30) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:25 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x25, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:25 executing program 1: unlink(&(0x7f0000000300)='./file0\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = openat$cgroup(r3, &(0x7f0000000400)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000440)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:25 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0600000000000000000000000000000005"}], 0x28}, 0x0) 23:07:25 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair(0x11, 0x3, 0x27, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100080000000000009700"/26], 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r3, r4, 0x1, 0x2}, 0x3c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r6, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r5, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r7, r8}, 0x78) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r14 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0x1, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000000600)=ANY=[@ANYRESHEX=r2, @ANYRESDEC=r9, @ANYBLOB="4965dac11a68fbf8fba4c4c441d38783a88b5d0e23bd4f373ffe53dd4a57445019c15edc096116a5dc7c1480c6c819fbc20468d1b91f313dae2dc6fe3ed72fbd89a652aa05140f35d58b3ac5c2cd3da6aaf326f75f63f66bb9983bd3a10973636fe90fd580c9f8394304f50de4cc98980dcf006e752beae0920063d8e7c97766bd40328a07756e15c6c28bc9222e1060e5c7e4965cfa712891d4e4604b9224e867360ee382d2611cb84775a88ad9cd210c975cb3f8e8fb43fd32e1a37293674cddc43e6b3906", @ANYRESHEX=0x0, @ANYRES32=r10, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRES64=r1, @ANYRES32=r12, @ANYRESOCT=0x0, @ANYRES32=r13, @ANYRES64=r14]], @ANYBLOB="4c8a9a2e2a0574aebe67ad6549eb42a2eb7e38ae66d99c5a9819b3b8c2e2fb5fc5adb5b8cb8fe2c3f6bada5371fd2ab9fd121fffa2dd4f7ba51e5b2047216afc832890a3d92ccc25547c6d53691bc0297a9467ee5b6851e612f08544de8e152fa3d9bf62011e76335e07f025ab6dd79f511d296d54ab20350bec", @ANYRES32, @ANYRES32=r11, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRES64=r2]]], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r3, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffc}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x800009}, 0x10, r7}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r15, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:25 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xffffffffffffffae) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/275], 0xda00) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x8) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuacct.usage_sys\x00', 0xf0, 0x0) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x20000001) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000)='threaded\xfc', 0x248800) openat$cgroup_ro(r3, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000100)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x4}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9f, &(0x7f0000000240)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)={r5}, 0xc) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='rd_\x82X\xaa\xaf\x16d\xe5C=\xee|\xa6\x1bVma.curr\xae\r:h\xeb\x84\xac\x968\xf0\x04\xe1s\xb6\x19\x9b\xccE', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0506617, 0x0) 23:07:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007aed231d1e000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x2, 0x0, 0x3f, 0xffffffff}, {0xb7, 0x5, 0xbb, 0x2}, {0x7ff, 0xd2, 0x3f, 0xfd}, {0xffff, 0x3, 0xff, 0xfffff000}, {0x3ff, 0x1, 0xc, 0xffffffff}, {0x6, 0xb7, 0x80, 0x5}]}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000040)=r3, 0x4) 23:07:25 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x26, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:25 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0700000000000000000000000000000005"}], 0x28}, 0x0) 23:07:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0xffffffffffffff13, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:25 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4faff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:26 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x27, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:26 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0800000000000000000000000000000005"}], 0x28}, 0x0) 23:07:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000401000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x7, [@dev={[], 0x15}, @dev={[], 0x1d}, @dev={[], 0x10}, @remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @broadcast, @broadcast]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe0000000085004b18de840000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='%$trusted@trusted\x00', r1}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) socket$kcm(0x29, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0xc1e789102a24f171, 'io'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}, {0x50, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'io'}, {0x2b, 'rdma'}]}, 0x36) 23:07:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r2, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r1, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r3, r4}, 0x78) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r3, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r6, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) openat$cgroup(r7, &(0x7f0000000600)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r8, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r9, 0x4) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r6, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r9, r10}, 0x78) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r11) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r11, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r11, &(0x7f0000000640)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2aa8a7bc148ca81b, 0x3, &(0x7f0000000040)=@raw=[@ldst={0x3, 0x2, 0x5, 0x4, 0xc, 0x2, 0xfffffffffffffffc}, @generic={0xfd, 0x3, 0x8, 0x8, 0x5}, @alu={0x4, 0x0, 0x8, 0x4, 0xa75f9991e7a99bc2, 0x50, 0xfffffffffffffffc}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xba, &(0x7f00000000c0)=""/186, 0x41000, 0x2, [], 0x0, 0x29, r5, 0x8, &(0x7f00000001c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x4, 0x2, 0x2}, 0x10, r9}, 0x78) 23:07:26 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0900000000000000000000000000000005"}], 0x28}, 0x0) 23:07:26 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x28, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7}, 0x10}, 0x78) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x0, 0x101}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r2, 0x5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r2, 0xfffffffd, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r4, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r5, 0x4) r6 = openat$cgroup_ro(r4, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r3, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r5, r6}, 0x78) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r5, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0, 0x0, &(0x7f0000000380)={0x4, 0x2}, 0x0, 0x0, &(0x7f00000003c0)={0x5, 0x2, 0x2, 0xffff0001}, &(0x7f0000000440)=0x569, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x2}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, [@call={0x85, 0x0, 0x0, 0x2d}, @map={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x5, 0xb, 0x9, 0xfffffffffffffff4, 0x8}]}, &(0x7f0000000100)='GPL\x00', 0xffff, 0x90, &(0x7f0000000680)=""/144, 0x40f00, 0x0, [], 0x0, 0x11, r7, 0x8, &(0x7f00000001c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x1, 0x1, 0x1ff}, 0x10, r8}, 0x78) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2, 0x42, 0x10}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:26 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0a00000000000000000000000000000005"}], 0x28}, 0x0) 23:07:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000480)={0x3, 0x70, 0xff, 0xfa, 0x8, 0x7f, 0x0, 0x7ff, 0x8450, 0x11, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x43d6d5e57313063b, @perf_bp={&(0x7f0000000440), 0x4}, 0x4120, 0xfff, 0x0, 0x5, 0x8c32, 0x7}, r1, 0x9, r2, 0xd) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000400)) r6 = gettid() r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) write$cgroup_pid(r7, &(0x7f0000000300)=r6, 0xebd2549039d9e01e) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r8, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x1) 23:07:26 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x29, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:27 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x17f, 0x10, &(0x7f0000000000)={0x0, 0x1}}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x178, 0x0, &(0x7f0000000440)="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", 0x0}, 0x40) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r2, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='syzkaller\x00', r3}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x1) 23:07:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:27 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0e00000000000000000000000000000005"}], 0x28}, 0x0) 23:07:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe0000eb310ed7f4f2001e0000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r3, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc0c0583b, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r6, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) ioctl$TUNSETOFFLOAD(r7, 0x400454d0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r2, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r4, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="851000000800000095000000000000000000000100000000008866567c5b0b1018d5c540b2d5ce718d6e113a5cbd2cab23d7b0d5726e21c92531f9773e8a3568d8794f732e547b89fe658904d4851a77551403008c"], &(0x7f0000000080)='GPL\x00', 0xfe000000, 0xd2, &(0x7f00000000c0)=""/210, 0x40f00, 0x9, [], 0x0, 0x17, r1, 0x8, &(0x7f00000001c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x5, 0x7}, 0x10, r4, r0}, 0x78) 23:07:27 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x2a, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:27 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "1000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffdffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x9, 0xa, 0x1, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='pids.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000580)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0x99, 0xb3, &(0x7f0000000040)="4b2390856ba125d1c452aa8ea34a4c7f2b1faa147f2846498436ba5d49ac26cd2675090d1de9693b11f367fed0fd686b69554a270ff72529d18e07e3a88d8adc2f1f7f529973aa76346d11c0e3625ab6bc7f0d4645cd51cc53b8ff1544adcd4b6583dbf1b174230747652aba6229e4f91f2d094c022bb86ef9945eaaef1c991f961d2a29e56946cd6b070bb11e955e76fac08bcc7cc7b3f32f", &(0x7f0000000100)=""/179, 0x38, 0x0, 0xbe, 0xbf, &(0x7f0000000440)="924b922cca34c764ed2193d80ba0b7f1025a8789dc0e5411beb69a0073dcdc1fdb35075dd6a39d55d45590d384d4b2264b6ae8485e7d0e4ab848f48f965655589ee2d3f675ba5654317739bf247c82b637d3fc37018ff772da48140c20dffa8e44b0fa475886454ea3cfc248c29857d618c1430d53c92604c263f325235bfa65a22c276f6676488de6db28a0fb044c15ebb5ee18b66d03f785c5bb114d583b83fd66d708350ae6ce7c60fdd36502cd1b46246b3922a88626eb772f4ecec3", &(0x7f0000000500)="8a6c768aa9f886da1f7f1b68fde3a3bcb0f3e3dcf4c3bb1eed05b400eec0642ec5281a56801ffb918563c66ef2905170794652d5810929de1f98364c397640bb90e675a129c5bbdefd3b0dc2eb61092453411824fe205da4ffff6fa1cd8e09de1b6eedbf56e9e65db5a78f3700ef0499b76607e088072f6a6de03dd354986511f628ffefb7353a3e5385a854a91c4a8fe4849a1ed6d67b10ececaa0b077da240eb6d32b55d266523e2423f170cc57ab8524b064c21e5dc8d638e318f240237"}, 0xffffff7d) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000600)=r4, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:27 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x2b, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000600)='pids.current\x00', 0x0, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000400)=""/178, 0xb2}], 0x1, &(0x7f00000004c0)=""/230, 0xe6}, 0x1) 23:07:28 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000400)='cgroup.procs\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000003000000bfa3e9ffffffffff0603000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a6a7426640000850000000d000000b7000000000000009500000000000000eb8f3e70e6c04e1b0a05b17bfd5c316b697d7d686ecde2f06bac26ae0b2f87fc6f8ff87c83f5915923"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x0, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:28 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "1100000000000000000000000000000005"}], 0x28}, 0x0) 23:07:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r3, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r2, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r4, r5}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @jmp={0x5, 0x1, 0xb, 0xa, 0x6, 0x6fe5690fd9554520}, @call={0x85, 0x0, 0x0, 0x22}, @generic={0x7, 0x9, 0x2, 0x3ff, 0xc2}, @jmp={0x5, 0x0, 0x7, 0x16, 0xb, 0x2}, @map_val={0x18, 0x8, 0x2, 0x0, r1}, @ldst={0x2, 0x3, 0x2, 0x4, 0xc64f25de71925536, 0x30, 0x4}, @jmp={0x5, 0x1, 0x7, 0x4, 0x7, 0xffffffffffffffff, 0xfffffffffffffff0}]}, &(0x7f0000000100)='GPL\x00', 0x7ff, 0x11, &(0x7f0000000140)=""/17, 0x41100, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x6, 0x7, 0xfffffffa}, 0x10, r4, r6}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000040)='}\x00', r7}, 0x10) 23:07:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r1, r2, 0x1, 0x2}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x15, 0xa, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, [@alu={0x3, 0x1, 0xd, 0x4, 0x4, 0xc, 0x1}, @call={0x85, 0x0, 0x0, 0x22}, @ldst={0x2, 0x0, 0x3, 0x9, 0x2, 0xfffffffffffffefe, 0x10}, @ldst={0x3, 0x0, 0x1, 0x3, 0x0, 0x20, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x2, 0xc, 0x3, 0x40}, @jmp={0x5, 0x1, 0x0, 0x9, 0xa68200df192c537d, 0x30}]}, &(0x7f00000000c0)='syzkaller\x00', 0x1ff, 0x0, 0x0, 0x41000, 0x2, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x6, 0x4f, 0x4}, 0x10, 0x0, r0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:28 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x2c, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:28 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "4800000000000000000000000000000005"}], 0x28}, 0x0) 23:07:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000a579e4ae4295abb68fe7f68249540820fb6ec011a3abc0e7856742de"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f0000000600)="cb30e7cf6e6d67360ea0ebb6f5eb6596d6a15ad0e6288518e9ea5aa3a372af8e22034c162aa5d70fac6e89a794381de2e4f9f4bd42e0dedb747fd706d47b74bf4bd3cc3307132a5ef5f104dc1577e517be1ee4ab2973b408385a321fffd7682bc56eb73a505db61f7d46dcd1d69b92939afd4005f5084008dfb736fe6c0b9ab3cf4da318cd7335acd4df40bd7f57ad10c6641938280f279d7979e605b2d45b4296a39e25059ff049c21542105e2fc778d34ca5c889e7a9df708021fd8510e2119c80fc", &(0x7f0000000700)="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", 0x5}, 0x20) r4 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xc1, 0x5, 0x6, 0x3, 0x0, 0x4, 0xa8168, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x14a85, 0x0, 0x5, 0x0, 0xba00000000000000, 0x1, 0x2}, r1, 0x0, r2, 0x9f04943395ce85d) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000300), 0x1}, 0xc1a7, 0x0, 0x0, 0x0, 0x3, 0x2, 0x4}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xfffffffffffffe6d, 0xf00, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x378, 0x368, &(0x7f0000000080)="8c", 0x0}, 0x19) 23:07:28 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x2d, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:28 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "4c00000000000000000000000000000005"}], 0x28}, 0x0) 23:07:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7ffffff00000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000000000950000000000000097d6cf4dd34d72debe55e950592d342461dcc7a409c4acdcd9a88472f7f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000080)=0x3) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0xc4, 0x0, 0x0, 0x40e00, 0x8, [], 0x0, 0x2, r1, 0x8, &(0x7f0000000100)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x5, 0x1ff, 0x7}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='posix_acl_access\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:29 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "6000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:29 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x2e, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:29 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "6800000000000000000000000000000005"}], 0x28}, 0x0) 23:07:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0xb, 0x4, 0x20}, &(0x7f0000000100)=0xc2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0xf43}}, 0x10) 23:07:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000880)={0x0, 0x1f, &(0x7f0000000000), 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000c00)=ANY=[@ANYRESHEX=r3], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000c40), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r8, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000006500)={&(0x7f0000006400)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000064c0)=[{&(0x7f0000006480)}], 0x1, &(0x7f0000007800)=""/201, 0xc9}, 0x1000) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r10, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r11, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0x8007fff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000840)={0x0, 0x4000000, 0x5, 0x8000}, &(0x7f0000000c00)=0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)=0xffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r12, 0x4) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f191400ff00000000000000", @ANYRES32=r10, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r12, r13}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000007980)={0x19, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000ff03000000000000000400002ca78000fcffffff18230000", @ANYRES32=r8, @ANYBLOB="000007ae0000000000000000", @ANYRES32=r5, @ANYBLOB="00000000ff0000000db6fcff0100000018000000020000000000000008000000d570c0fff0ffffff3a46f8ffa8b5253dd1320000fcffffff9500000000000000"], &(0x7f0000000380)='syzkaller\x00', 0x8, 0x33, &(0x7f0000000800)=""/51, 0x41000, 0x4, [], r9, 0xb, r5, 0x8, &(0x7f0000007900)={0x4}, 0x8, 0x10, &(0x7f0000007940)={0x4, 0x0, 0x75b4, 0x401}, 0x10, r12, r4}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r6, r7, 0x1, 0x2}, 0x3c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x40, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x1}, 0x0, 0x0, &(0x7f00000002c0)={0x5, 0x3, 0x4, 0x5}, &(0x7f0000000440)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0xffffffff80000001}}, 0x10) r15 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000640)={&(0x7f0000000600)='.\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000f9ffffff000000000500000015263000f0ffffff0de60600fcffffff850000001a000000182d0000", @ANYRES32=r5, @ANYBLOB="00009500000003200000000000000000"], &(0x7f0000000080)='GPL\x00', 0x1, 0x4f, &(0x7f00000000c0)=""/79, 0x1e00, 0x8, [], r6, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xa, 0x0, 0x81}, 0x10, r14, r15}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x8}, 0x10) 23:07:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:29 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x2f, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:29 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "6c00000000000000000000000000000005"}], 0x28}, 0x0) 23:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg(r1, &(0x7f00000002c0)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000002600)=[{&(0x7f00000000c0)=""/200, 0xc8}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/30, 0x1e}, {&(0x7f0000000280)=""/9, 0x9}], 0x5, &(0x7f00000004c0)=""/196, 0xc4}, 0x16042) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x7fff, 0x6, 0xf83, 0x100, r0, 0x2ad, [], 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x3c) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r1, &(0x7f0000000440)="defcca825b7bec9d4852caf8fbd4c73a5f8137507f6fc5e69129e415fc24a2787408a4db59fd722cfe52cecc30b5668447f75bbf7cf3b6a86a2da0e4bc62274adfa2b1fa83f3e546cdb3e87036efb4fe485443adbf402ba8fc451e79a10e4831bda9542b14fcfb77ac35109c8e5f2cdf7fb5d5c546e697cfb36c3b7e7a044aff573b1d2258d57a3b7ee182cd8cdd46c52387534877d7787d746c1fa7338184d438c44c2d8c94e2260f659a51506b9b4f061bb31ea3ffa6bef818722ed3b5c85ba3ce1ad49d1574d526c20224997a544bee154c26ca1f7ca1a06b29eb03c3c2fc0173c8f35b178832021158bcd9866e654744081ef57f56889db94e41", &(0x7f0000000600)=""/129}, 0x20) r2 = openat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000001c0)='io.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x400800, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r5, &(0x7f0000009ec0)={&(0x7f0000008a00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009d40)=[{&(0x7f0000008a80)=""/4096, 0x1000}, {&(0x7f0000009a80)=""/26, 0x1a}, {&(0x7f0000009ac0)=""/249, 0xf9}, {&(0x7f0000009bc0)=""/41, 0x29}, {&(0x7f0000009c00)=""/17, 0x11}, {&(0x7f0000009c40)=""/74, 0x4a}, {&(0x7f0000009cc0)=""/58, 0x3a}, {&(0x7f0000009d00)=""/44, 0x2c}], 0x8, &(0x7f0000009dc0)=""/235, 0xeb}, 0x10000) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000009f00)=r6) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000040)) 23:07:29 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x30, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:29 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "7400000000000000000000000000000005"}], 0x28}, 0x0) 23:07:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300000000000007000000cc00000000f0fff8ffffff79a4f0ff00000000b5060004ffffffff2d6404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa3000000c829e2780000eeffff7a0af0fdf8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030a0079dde96895d5c100f600000000850000000d000000b7000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xd6, 0x80, 0x0, 0x9, 0x0, 0x8, 0x82db92927b9b8ca9, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000000c0), 0x2}, 0x4290, 0x40, 0x9, 0x2, 0x253, 0x2, 0x2dc}, 0x0, 0x3, r1, 0x1) 23:07:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0xde, 0x3, 0x0, 0x5, 0x0, 0x10000, 0x797953f384bc46b8, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000000c0), 0x7}, 0x3000a, 0x3ff, 0x5, 0x7, 0xc4a9, 0x7fff, 0x94e1}, 0x0, 0x5, r2, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3f, 0xfc, 0x9, 0x1, 0x0, 0x9, 0x80, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4192, 0xc, @perf_config_ext, 0x8, 0x0, 0x3, 0x5, 0x100000001, 0x81, 0x6}, r4, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) r6 = gettid() r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r6, r7, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r8}, 0x30) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000480)={r1}) sendmsg$kcm(r9, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000600)="cac4c0d9188a35e91e4a861077bcf19e291b4972367a7473de2b0158bb9f55a936f68ac27eeab374e1d1634a6de4d899b90d3bc78ae922ab151a32461b14cd111cb73dc734418e0562ecaa26994a2e03e287c446a5c0f081e706d2074f19dada3ed3bb44de281f5cdc288ab8d9cb2d0a900554106e3e942217a875c67d7e5a3bc9bc7aec45ffae5a2a15c63d307f6059698e1a298ddda66ca64978addd71717951e5dd0681eb195656d6f5f59e7300dff8342163b57386fc25d70767fa7bc180cb8169ca76a952719ec6f571a148314c4f8529b35c17d9644cc8eacde09716d3111c4a6bf108bf36613f6533", 0xec}, {&(0x7f0000000700)="b114c7be546105f1d7dc7e33e318ef196cbc84d25830f6b597106850f4e0d9e2ecff51787ebc475ad508f62d8ff45aa64fc93567ab8bdeabffb0f842ec058161ea4ce422a66ba69797549625673960a6f0a3494cf89a75d538846b34b353b629025ef149ad89383b8dbdaa38c6b2da03ca367b42ffadd63701e3f5be3c740719f6f205510aeb96cda52114b3b87e6ac790e68106d3eede2df5c0035584feba1d9ea3008e51d3568a08c4eb314e943b405a0b398ee2c432f6daa26bafbe6009b5f167ed7f8923ca50c6dfb0d64eadf84779bdcec976d8b4bc5a07fba12f987a053cbac643aa742cfa8020d70dfcfdf7", 0xef}, {&(0x7f0000000800)="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", 0x1000}], 0x3, &(0x7f0000001800)=[{0x28, 0x169, 0x80000001, "436c5562d013efae14485b0cb141e6853c2a8c"}, {0x10, 0x181}, {0x100, 0x102, 0x3, "59d34b889a1400ae692458ec11d7151d2d4f445ef393d7e0b3f642bf90cd17a6c7b7827e54dc0300ed8ef26d2b764174efea7c9fe9cd9dd3555b04ae43331bb84a33c0507841ef5d4b2a94750ca58929aec0679ee7160a52ae253cac944cabb0811d5f739d8867c975dbda9eea978ec8a8359ad98edc238aaa147b8f378361c5248a6449f330c174535cacb353857e4e5826452dbc294f989cb432397e105c0b69c7b434f6e7d3be6d3dd629ab143a0ae985abe94feb09d2848a02a812b1fe05e5ddcf87aa1c58b1d263e3006fb1f3ea1e4206e38e31424802eafb1d3ec4bf610be5f1cedd37ce3c25"}, {0x80, 0x101, 0x800, "373b6880596fe366875e7d58b0007196aed7d0bebcafc3533a0ea9448ae8a64bbe197694792a910dd794147e3e1ff1099fffff4f2fbced1e9f8c01c3cdc217dc07904fd2a8f8000d0a86ee94e30d007c00c6f4cd412937906af354d95088f07fbbc644206ce402230480d0"}, {0x78, 0x10a, 0x3, "7f958b0e041188167d290422f8de1f410f864535abdc870480af8252d3e459167c1ab5ee68547f427d61e0bade9c2343912bd2e3d1bb0f684af5e1fd70ea0d2265b097b6191ef031d39d353a9cef8a0a49b9f6826165e6fd4d3bb19db922cf7d5450"}, {0xe0, 0xff, 0x3, "310b7a06e402f993d0d88ea3f24d2ddce55ec5fb78d684ef2f055636f50ff214cb57166afb6fab4d191e71c07e19db8a884b3dedf8d2eae018f53bef8f007f6425564bec29299c968627d95fb391eb24ac41496b950e6b006b2f28c2aa7454d9b2eead647717fad0e1728600f74e533333f72cd4a0f8f42b6967f36ddea185e8fc3b87bbbf117983534c2725d82204806930687858f6da3921ad1fb535251c3f22d41330210f62a3b4cbc90a94d1050823e56d11ae3afd86aa9ac604a36a7c1f2628405dc5c04dd1a7b388"}, {0x70, 0x118, 0x957, "0d7f7b7606310beb4f1f0f49cef9fc42679a3c4fa471259c0311ca64a83450844b099a80d7dc17d42764374b0d8bd37457259e9965eca24340856726b9388877e129ffd4d0af767d758213f834f7e7e0fb99cd0a6aebf6c6d33995"}], 0x380}, 0x4040000) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r8}, 0xc) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r10, 0x4) 23:07:30 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "7a00000000000000000000000000000005"}], 0x28}, 0x0) 23:07:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = perf_event_open$cgroup(&(0x7f0000000400)={0x1, 0x70, 0xf8, 0x2, 0xe0, 0x40, 0x0, 0xfffffffffffffffd, 0x800, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x3, @perf_bp={&(0x7f0000000300)}, 0x10041, 0x3, 0x0, 0x6, 0x8217, 0x4, 0x81}, r2, 0x3, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) r6 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000500)={[{0x2d, 'memory'}, {0x2d, 'cpu'}]}, 0xd) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x6, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000480)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 23:07:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() socketpair(0x3, 0x5, 0x1, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000440)="231a6e13dc7b164170244c4c87da4382ce5397597adc2302d2088f31a500b5e3a66dc3f2432ca1e9d84cfee40af34ad1e7b3b7625b3fa73e2ed3f6e03dcd0a92181a9c11aaff0ef7cb7ced4ab5efbcf1ae245bcff5350124d00d232868b4cf3d7e", 0x61}, {&(0x7f00000004c0)="61b33d2e76bc4a83fa4026", 0xb}, {&(0x7f0000000500)="e2cd43d888116b21f63f9f72f65530db5fefd11198e8f55697d35b11", 0x1c}, {&(0x7f0000000540)="52a641d966cb1743e80601762b6f3ad051cbf5c7ce720fd980454182f5ba21a2c653c2476ab7405eae9820fcd00066f4e89a68d5f3120ee1598d9ff5bee2fbe40660fd640f281a352356fe2f4d3a497c46edaa3027c5a1bcc4b225e8aba5ac6986a3bf972beaac830144ad16f4ddebac56591ab9593b535ac0de0f076f9d7c8cf445a0b534c34743aeb6bc67bb5ca22ad3190fdfe155f904fd11f4e9c4b7ce4d3a77f77faf", 0xa5}, {&(0x7f0000000600)="3ee3adc3820a7de90b735851f6d73d2c71c7d3b3b177a5857b3ec32298d63e1bcde21b78c6eac2ea3ec66ac7db5ce99e489262d01484d1290ec3fdc964632f3670821b54ede3487c9edd8e4183e79e65ca924e2a4247f59d2ff57bc967a3841cf67eab1ddb7a6d119d2451cd194263ddeb3efd51d7f8e06b5f41054f7d4c6eadef03fc820ead", 0x86}, {&(0x7f00000007c0)="799df4ba12a7abf3ffd507fd14cddf339a94d3ad56f0dea13a0e3a1552e46aa97a191dd0fc1a687a98f50d96495ee2d4d951e0a1c1fc38939400f9351d846abe6ff419c45f0e0d60c8e9b7daa1b9c454dbcb11aa8d71723ee699dd77931b4027ebcb8d2e2343616db3915c7132eb51549ee91af629816fab80a35883c492d35df2baf57166a6a06668986c3e10b860ea0b2b9c531138cc7e14be0ecc129bc0f38e1b3f38da4762671a6af6bc48b81682984146eade2ef12e79376385f82a3eed0006296b4d3b7b35548c0f9fbecafc340138cee9c116725caacf1c35d55f", 0xde}, {&(0x7f0000000700)="a07bd85e6f010a41339ad9cd28916d6c1986ce3d13710113a6b2211476bd2f6aa2b98cacc32af872fe3da8093ffa66abbd767dcc7ec8a1339f48fd5345a93f23", 0x40}], 0x7, &(0x7f0000000940)=[{0xc0, 0x3a6, 0xa57, "caa12053b09b7c7dd417f6b357c04abd81b65ed005bdbda680c5bab74195a25ebdb0be24b86fcaffdedb57c0737822a1254fdbb5495867b86ce3df97bbae323effcf11df97e64622d1684efe2f2d18761d89e6df1de9a7e5147e8d4a29bd0fb904c584d7a76bf9aa8e1c2eab499f8f0593435002801df618248125525e728c309278229be3e32c032262fb1a544565b6e480b64070d37a5fe2180f191ca8d66f8d522ea526ee873a2f5d8194db5a"}, {0xd0, 0x101, 0x1ff, "fa849cb86758d733f5e2b7db5b0464e4ba37f23e84802d34061cbce233ac13c6ec21f186ddd7f5ed405e1c32485af05ee28ff3f0749fbbedd348f0b242c5209270997421945b61b76cc24cc62b416ccee6195d3c79f1b3191f6cc15e8a807a5625a491db9fc45b76717078b0b1bc7b88c3cf8521c83cf2905e15149610040d18f0aaa4de219dba4320d7d0b1d2ffad797929f69e830c90df70d3dbd079da22ca9e6c829aec886b364d45ee2b4a70cfcb592e04ee11ea85166f"}, {0xd8, 0x111, 0x3, "89c77ad121727346e18baaa981f3573dafc72a19ac6e4c1d538faca67be6c0ac27a35770daf11ce6103ae2f74f5620d17d92e19b29a640def26d9bf83d2a942f9b4e696a3d9b129879e1564e1c75423db33a00991d1dd411a909d43bc769b362312b8587569f5457381888392365aaeceebbde10c4d702748e8ef22a0d93b8ef032ab53f36c632b7f1bd83f9bb6c3ec2068e0075e885aad5bec73fe81ff0fa901a6ce4936ca6cb2feb57fc7fb8ff2ee38c424b81d1f33eee4052e45cc48616142e60eca898fcf3"}], 0x268}, 0x6904e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000f80)={&(0x7f0000000c00)=@nfc, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000c80)=""/76, 0x4c}, {&(0x7f0000000d00)=""/67, 0x43}, {&(0x7f0000000d80)=""/129, 0x81}, {&(0x7f0000000e40)=""/136, 0x88}], 0x4, &(0x7f0000000f40)=""/7, 0x7}, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) openat$cgroup_int(r3, &(0x7f0000000300)='cpu.weight.nice\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702040003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff1f00000000000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000000000950000001d7c82eb87cc774884eeef387aa03400000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xd, 0x0, &(0x7f0000000140)="4fb84819ceb464748eff87b86d5b1da0e3036e3a9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0xfffffffffffffdf2) 23:07:30 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:30 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "fc00000000000000000000000000000005"}], 0x28}, 0x0) 23:07:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000100000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:30 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0003000000000000000000000000000005"}], 0x28}, 0x0) 23:07:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r2, 0x28, &(0x7f0000000080)}, 0x10) 23:07:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x16, 0x3, 0xf4, 0x1, 0x0, 0x2, 0x2000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x5, @perf_bp={&(0x7f0000000040), 0x1}, 0x20000, 0x7, 0x4, 0x4, 0x40000, 0x8, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:30 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x2, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:31 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0005000000000000000000000000000005"}], 0x28}, 0x0) 23:07:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b70200000300000004000000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000000000000095000000000000005f4c60bd15112567b3a34ffdf2cc51c72b4c7428b29aa478fb213522fbd5eaaae3136216ed20fe9b9d339725fc7f06b269490fb5a4c96ccd549f512198145db76bb9e411fd187fc315a96fcd28bebc2d0addef2a2513960e9c43bbc1cf230a3eac8a0809da3a97d8ca63b1"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140), 0x4) 23:07:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000300)=0x2) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r3, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r4, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r2, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r4, r5}, 0x78) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xe, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000001000000000000007f000000850000003a000000850000002700000018230000", @ANYRES32=r0, @ANYBLOB="000000000100008085100000f8ffffff18000000090000000000000002000000181d0000", @ANYRES32=r1, @ANYBLOB="000000000000000018180000", @ANYRES32=0x1, @ANYBLOB="0000000000002303e0ff0000000095000000000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000600)=""/4096, 0x41000, 0x6, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xe, 0xed56, 0x24}, 0x10, r4}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r7, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:31 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x3, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:31 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "aa05000000000000000000000000000005"}], 0x28}, 0x0) 23:07:31 executing program 5: ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020005030000000500000000000200000000000000ffff7a0af0fff8ffffff79a4f0ff00000000b70600006405000000000065040400050000000404000021007d60b7030000000000007a0a00fe00000000690000000d000000b70000000000000095000000000000005779c9e8c9785b3d10b399fe0578a749a3e18de24b6169e246ae4dcad3f546aacf2a1210d942d2946a9e8d59230e8dac43e06caaf60000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000140)=0xb5ca) 23:07:31 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:31 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0006000000000000000000000000000005"}], 0x28}, 0x0) 23:07:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300000000007ddd2f00d0e7a1be161b87f03c31e0000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404001401007d60b7030000000000007a0a00fe00000000850000000d000000b7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:31 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x4, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x52, 0x5, 0x7, 0x1, 0x0, 0x81, 0x40000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x3, @perf_config_ext={0x5, 0x8}, 0x89a6d281c901f382, 0x38049c49, 0x1, 0x3, 0x7, 0x8, 0x9}, r2, 0x5, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:32 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0007000000000000000000000000000005"}], 0x28}, 0x0) 23:07:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000161cb231b959d0ce1e39ee55cc078bb82b13380c8f139d61eeef1680a4452b29075fbdd57c95304653c4959fcbf8d9c180b479317cdb052ef85998cc780fcccce0e24eb1aecaffd3bc6037e2aa3ce76836f7ca10f1896113eabd708c94ef9adc2c602c7139219bb230"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f000000d580)={&(0x7f000000c340)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000c540)=[{&(0x7f000000c3c0)=""/198, 0xc6}, {&(0x7f000000c4c0)=""/90, 0x5a}], 0x2, &(0x7f000000c580)=""/4096, 0x1000}, 0x10000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0)=0xffffffffffffffff, 0x12) openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000d640)={0x3, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x520, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffffc}, @call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0xa4, &(0x7f0000000100)=""/164, 0x41000, 0x7, [], r2, 0x0, r3, 0x8, &(0x7f000000d5c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f000000d600)={0x2, 0x2, 0x10000}, 0x10}, 0x78) 23:07:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x8, 0xff, 0x6, 0x6, 0x0, 0xfffffffffffff53d, 0x9201b3da7a70f8f, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x80000001, 0x7ff}, 0x800, 0x80000000, 0xffff, 0x9, 0x5, 0x5, 0x7}, 0x0, 0x7, r2, 0x19) 23:07:32 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x5, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x4, 0x18}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x18, 0x8, 0x7ff, 0x8, 0x140, r0, 0x8, [], 0x0, r1, 0x3, 0x3}, 0x3c) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:32 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0009000000000000000000000000000005"}], 0x28}, 0x0) 23:07:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000975cd2784ec0b507ac1c11fd550703000000eeffff130af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d00000000650404000500000004048ffe5ba2adfbdc0925d4ab000001007d60b7030000000100007a0a00fe00000000850000000d000000b7000000000000009500000006000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) write$cgroup_int(r2, &(0x7f0000000300)=0x800, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x0, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0xf, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x100, 0x1, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0x80000000000c, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup/syz0\x00', 0x200002, 0x0) 23:07:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f00000018c0)=ANY=[@ANYRES32=0x0, @ANYPTR64=&(0x7f0000001880)=ANY=[@ANYBLOB="6d22414dbb415f1f0e5d33961fbb3b48cf800c9b942ed83e325793a10e89", @ANYRES32, @ANYRES64=0x0]], &(0x7f0000000340)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg(r2, &(0x7f00000001c0)={&(0x7f00000000c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/27, 0x1b}, {&(0x7f0000000440)=""/149, 0x95}, {&(0x7f0000000600)=""/216, 0xd8}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f0000000500)=""/169, 0xa9}], 0x5, &(0x7f0000000700)=""/4096, 0x1000}, 0x100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r6, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r9 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r9, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r10) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r10, &(0x7f0000001cc0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r9, r10, 0x0, 0x4, &(0x7f0000001800)='GPL\x00', 0xffffffffffffffff}, 0x30) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r11) ioctl$sock_kcm_SIOCKCMUNATTACH(r11, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r11, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r5, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r7, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0xb, 0x7, &(0x7f0000001980)=ANY=[@ANYBLOB="9500000000000000850000006a00000085100000fbffffff18250000", @ANYRES32=r1, @ANYBLOB="00000000b9000000950000000000000015000000000000004e40ed70edb9fb674630c73821e97f3ed46adcddddf8e8310d94ef5cc021debcaaea3256b63e7b5be147bc10881f8d8b7ae26ffd6d3b296d5a7f2742944965e05e04f82dd61ef6a081f27b8e56c8e98ddcb4ff"], &(0x7f0000000080)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x83c00, 0xa, [], r3, 0x7, r4, 0x8, &(0x7f0000001700)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000001740)={0x4, 0xf, 0xfff}, 0x10, r7, r0}, 0x78) 23:07:32 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x6, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:32 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000a000000000000000000000000000005"}], 0x28}, 0x0) 23:07:32 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "b80b000000000000000000000000000005"}], 0x28}, 0x0) 23:07:33 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x7, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa20000000000000703000000ee09007a0af0fff8ffffff79a4f0ff00006500b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000580)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r3, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x101, 0x7, 0x1, 0x400, r2, 0x1, [], r3, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) recvmsg(0xffffffffffffffff, &(0x7f0000009400)={&(0x7f0000008b00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009240)=[{&(0x7f0000008b80)=""/155, 0x9b}, {&(0x7f0000008c40)=""/193, 0xc1}, {&(0x7f0000008d40)=""/20, 0x14}, {&(0x7f0000008d80)=""/138, 0x8a}, {&(0x7f0000008e40)=""/208, 0xd0}, {&(0x7f0000008f40)=""/68, 0x44}, {&(0x7f0000008fc0)=""/181, 0xb5}, {&(0x7f0000009080)=""/157, 0x9d}, {&(0x7f0000009140)=""/209, 0xd1}], 0x9, &(0x7f0000009300)=""/212, 0xd4}, 0x1) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000009440), 0x4) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r7, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r8, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r9, 0x4) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="0f0100010400080000000fff47a5cea19ef7", @ANYRES32=r7, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r9, r10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000095c0)={0xffffffffffffffff, 0x10, &(0x7f0000009580)={&(0x7f0000009500)=""/104, 0x68, r9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000009600)={0x7, 0xa, &(0x7f0000000440)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x11}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @alu={0x7, 0x0, 0x2, 0x5, 0x8, 0x8, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, @map={0x18, 0x0, 0x1, 0x0, r4}], &(0x7f00000002c0)='GPL\x00', 0x8, 0x8d, &(0x7f00000004c0)=""/141, 0x41000, 0x1, [], r5, 0x3d, r6, 0x8, &(0x7f0000009480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000094c0)={0x4, 0x3, 0x7f, 0x2}, 0x10, r11, r0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r12) ioctl$sock_kcm_SIOCKCMUNATTACH(r12, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r12, &(0x7f0000001cc0), 0x12) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r12, &(0x7f0000000040)="f05ceb74f8f23a0ba6e0959571f7e56584df71cfbf6b17fc70dcb0841ca9bded8abe50763f5f38203b17fe6812a77f4649a43fa6a9cc422bf4daf116756693682467a9b935a1cb2a0fcbbc217f338f5eacd155dfb14ece0dc9a24e00a65b98a47bf2c73bcbd564c4b29bef9df48ec227bab6b7c4e2a2db13bfbc515fb3e06cd6e5522a45ff310dd03590343a0798505d99437ce7455c00ee5bb30b5ae52631a0403c54c31a4f5bd54ce32df011e62ad108f630a2a7a6fd2d8affc47512e388be1635763287162c2409b509da", &(0x7f0000000140)=""/82, 0x4}, 0x20) 23:07:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() r2 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x80000000000}}, r2, 0x2, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000400)={r3, r6}) 23:07:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r2, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r3}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r3}, 0xc) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000260e53c3a8f3bacffff435c96679774e419b6641db5f21877d8865b9b7bcad98ac3274f0453eedb95bc2923e118ffd59d4c44954be69bad60e2aa56f00"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r3, r4, 0x1, 0x2}, 0x3c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r5, 0x10, &(0x7f0000000280)={&(0x7f0000000440)=""/174, 0xae, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40}, [@map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfff}, @map={0x18, 0x1, 0x1, 0x0, r2}]}, &(0x7f0000000140)='syzkaller\x00', 0x7, 0x0, 0x0, 0x60880, 0x9, [], r3, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x0, 0x1, 0x3}, 0x10, r6, r0}, 0x78) 23:07:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 23:07:33 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x8, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:33 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000e000000000000000000000000000005"}], 0x28}, 0x0) 23:07:33 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0011000000000000000000000000000005"}], 0x28}, 0x0) 23:07:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 23:07:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b7020000e81a9b2c54fa287596f75103000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640200000000006504040001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000d2047bcd94a202b3f892c8eeffc195d6bde5a5b583c1b29823dc03c767edfa47187413dcc4e82c40023ea4ad1ba027f2422d33f2103c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:33 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x9, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:33 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0020000000000000000000000000000005"}], 0x28}, 0x0) 23:07:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b70200000300000001000000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000080404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700080000000000000000000000000068d8c125eda92dc9b1f9c2e04653807b1430859a02745e7a817744b5b2cd4a1c379a92268445c4dca8e7a075303367e7109946c9c5cb7f6f13d01d2f04221da331428b9ef2b56aec94e8a1821358f1defeb6b7d0986f02a0679151793dde997753a842860e25af47a450b207becc7a5b033cdb97c3defd89c9e01af3b93a3416a40db1702f89ba4104912c32c0454a4d41b26457b45ccf3a2d04a54fe6a97b0f73d25f70d05c1d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x10000, 0x10001, 0x30000000, 0x2, 0xffffffffffffffff, 0x7fffffff, [], 0x0, r0, 0x0, 0x1}, 0x3c) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r3, r4, 0x1, 0x2}, 0x3c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000c00)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000c40)='cpuset.cpus\x00', 0x2, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f00000004c0)={r8}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000380)={'\x00', 0x1000}) recvmsg(r9, &(0x7f0000000bc0)={&(0x7f0000000500)=@x25, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000580)=""/29, 0x1d}, {&(0x7f0000000600)=""/119, 0x77}, {&(0x7f0000000680)=""/66, 0x42}, {&(0x7f0000000700)=""/217, 0xd9}, {&(0x7f0000000800)=""/249, 0xf9}, {&(0x7f0000000900)=""/131, 0x83}, {&(0x7f00000009c0)=""/160, 0xa0}], 0x7, &(0x7f0000000b00)=""/183, 0xb7}, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r10) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r10, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0xa, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x2, 0x0, 0x1, 0x2, 0xfffffffffffffff0, 0x6e8133b443bc5346}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @jmp={0x5, 0x1, 0xcfca4f3f6c6b4a67, 0x1, 0x0, 0x100, 0x1c}, @map_val={0x18, 0xa500edb0b2cec210, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xda3a3c0}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc4, 0x0, 0x0, 0x0, 0x5}, @generic={0xc9, 0x8, 0xf, 0x1, 0x54}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x800}], &(0x7f0000000100)='syzkaller\x00', 0x6, 0x8a, &(0x7f0000000140)=""/138, 0x41100, 0xf, [], r3, 0x0, r5, 0x8, &(0x7f0000000280)={0x9, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0x1, 0x20, 0x748}, 0x10, 0x0, r10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000300)=r2, 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x1f, 0x0, 0x4, 0x4, 0x0, 0x9, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x1, @perf_config_ext={0x7}, 0x8001, 0x3, 0xfffffff0, 0x5, 0x7ff, 0xfc0d, 0x7040}, 0xffffffffffffffff, 0xb, r4, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0xc0002, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000600)=""/192) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000540)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd660b3da944922f549a04619560670891f89f4e6ad03d7df207625fcfbf2d5ee272d69b4dd36cae556b569f", 0x2e}], 0x1000000000000450, 0x0, 0xfffffffffffffeba}, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={&(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000440)="db84968c3e13693c74068bb40cc3e9aff7feb926efa91d7a433d0728a584316f86afec59eb09d2a094602107302f9468e27eaf2df6549dabc04d2a7d578812817c56e2abec9b344de94e30af1ad189cccbbe13785b3795bc93b0d645185716c40c438ec52902f039bcd706632fd2013c6cd4d446e36dd8355acedfd27bf85f885e340e3a9910893996b301a831fe7f5a4ea846fe37e4f38d7888550da52724d3e34f7cda9519e9173a35dcfec3f1b53661c25c41e246a23c9a099010976288b82416f6c2d3408fe0065b3327e17f8c9cdbfa5e4251bdd0ff441aca", 0xdb}, {&(0x7f0000000100)}], 0x2}, 0x8040) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000280)={r2}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000002c0)={r5, r0}) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) gettid() r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4770c371c0000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r7 = openat$cgroup_ro(r1, &(0x7f00000006c0)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={r7, 0x0, 0x7, 0x74, &(0x7f0000000700)="20f85917792d37", &(0x7f0000000740)=""/116, 0xdb, 0x0, 0x89, 0xaf, &(0x7f00000007c0)="959f45a50c050b56f161cb742d2194a83e944ce409dc69c5eee274915ace71601ef053b6c1e3002a5c2f040ddebefb85aa7aea8971fe06bfc308d41fd0ed399701297e7f7c675ad761b655ef15894f4d78ca16d439adc1a0ece6bdb84d3326f981f0af73911bfa9aa45d94fddaba3d1218d1c05c1c7212fe7d496e1849c501bdc5ca597cc04ea4be50", &(0x7f0000000880)="c1af81b58607016eeafb2f2ee83a8ab3801f08397c12f86dd60451570e7cb62908b5b5d224b984d5f20755e2e217cb0728fd61da34738e462130f806a53738626b4b35407899533f83a94d0a3708c0bcf43db5fb0329ef6dda4b42040960dc191b065e85165e11ad4abdc42f17223f1f31f37ae363e91ac297f4a0a4a1d870e546c18845dd324a05f2368262df04e348ca10cc804373e135333a8b849677af3f506d47cc98b4ade6669828188273f3"}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:34 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0xa, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:34 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "003f000000000000000000000000000005"}], 0x28}, 0x0) 23:07:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0xb61c0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006b40)={&(0x7f0000003800)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005ac0)=[{&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)}, {&(0x7f00000048c0)=""/169, 0xa9}, {&(0x7f0000004980)=""/16, 0x10}, {&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/225, 0xe1}], 0x6, &(0x7f0000005b40)=""/4096, 0x1000}, 0x10020) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000006c00)={0xb, 0xd, &(0x7f0000000440)=@raw=[@exit, @ldst={0x2, 0x4, 0x3, 0x0, 0x9, 0x0, 0xffffffffffffffd4}, @map={0x18, 0x7, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, @jmp={0x5, 0x0, 0x6, 0xb, 0x8, 0x4, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map={0x18, 0x5, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f00000004c0)='syzkaller\x00', 0x9, 0xfd, &(0x7f0000000500)=""/253, 0x41100, 0x4, [], r5, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000006b80)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000006bc0)={0x4, 0x5, 0xffffffff, 0x40}, 0x10, 0x0, r6}, 0x78) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f0000000400)={r8}) 23:07:34 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0040000000000000000000000000000005"}], 0x28}, 0x0) 23:07:34 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r2, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='syzkaller\x00', r3}, 0x30) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r5, r6, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, r4, 0x0, 0x2, &(0x7f00000000c0)='/\x00', r7}, 0x30) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r8, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0xc) 23:07:34 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0xb, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff790104000000000000060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000858000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001b80)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001bc0)={[{0x2b, 'rdma'}, {0x2b, 'pids'}, {0x0, 'rdma'}, {0x6, 'pids'}, {0x2b, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'pids'}, {0x2d, 'memory'}, {0x2b, 'io'}]}, 0x35) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$sock(r2, &(0x7f0000000580)={&(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x41080}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000440)="e397b61f73f87ed76d0aa76997996449c841d19e0f99ae56fab47bc89390f990da9645c3debc843b1b7140bfd2dbe3e11ebee9445d249d42ad3acfad28f66be57e7fc0e72711c7dd65a4edf7bf7f522767f30590dcb9d3ebd827bf48ebe42485f9f11723219a7183288b0e7a445d89a7fb81dc27ef528c0472cc393172fe6aa569d40161ba8d35267163036a6b33391940320797ea942d863b89e1beeb90d4a562934e2771681bcd6697ed427fde1fccc9a37838f6cfeae37baf625218bbc4680bbbe2e4b61178cedfb47f715654285cb90e2f65a023cc00f07c4d8191c8b2", 0xdf}, {&(0x7f00000000c0)="88013b31f50f13e6d9634f8e309c4d5cdac80b", 0x13}, {&(0x7f0000000100)="5f109aa9f2aeea24292b873e7f08fd70cccbb4f24e2e5e425c4656", 0x1b}, {&(0x7f0000000180)="43b7d40ed231aed22ea4c11eb3d2eb8a5c32d48082a6cd3b0df4e4c5da27fc7a627484511e10c52a44a11d56c5d42c81466c9f022f183f00c5ee3706ff5594f179", 0x41}], 0x4, &(0x7f0000000540)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}, 0x4000) close(r2) recvmsg$kcm(r2, &(0x7f0000001b40)={&(0x7f0000000600)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000680)=""/41, 0x29}, {&(0x7f00000006c0)=""/192, 0xc0}, {&(0x7f0000000780)=""/2, 0x2}, {&(0x7f00000007c0)=""/50, 0x32}, {&(0x7f0000000800)=""/107, 0x6b}, {&(0x7f0000000880)=""/41, 0x29}, {&(0x7f00000008c0)=""/32, 0x20}, {&(0x7f0000000900)=""/244, 0xf4}, {&(0x7f0000000a00)=""/35, 0x23}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0xa, &(0x7f0000001b00)=""/63, 0x3f}, 0x8020) 23:07:35 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0048000000000000000000000000000005"}], 0x28}, 0x0) 23:07:35 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0xc, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0xfffffffffffffffd}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x2, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x0, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r1, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) 23:07:35 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f000000fac0)={&(0x7f000000e9c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000fa40)=[{&(0x7f000000ea40)=""/4096, 0x1000}], 0x1, &(0x7f000000fa80)=""/11, 0xb}, 0x10040) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:35 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "004c000000000000000000000000000005"}], 0x28}, 0x0) 23:07:35 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0xd, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xf8}, 0x8, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 23:07:35 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0060000000000000000000000000000005"}], 0x28}, 0x0) 23:07:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:35 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0xe, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000000d009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r3, 0x1, 0x2e, &(0x7f00000002c0)=r2, 0x26d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0xfffffffffffffed9, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1}, 0x10) 23:07:36 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0xf, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:36 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0068000000000000000000000000000005"}], 0x28}, 0x0) 23:07:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) 23:07:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x205, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0xc, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x29c, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:36 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x20, 0x1, 0x3, 0x5, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x30d, 0x2, @perf_config_ext={0xff, 0xffffffffffffffe0}, 0x8120, 0x5, 0x0, 0x9, 0x6, 0xabe6, 0x40}, r0, 0x5, 0xffffffffffffffff, 0x1) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = perf_event_open(&(0x7f0000000480)={0x5, 0x70, 0xc6, 0x0, 0x3f, 0x0, 0x0, 0x5, 0x4000, 0xf, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x3, @perf_config_ext, 0x10060, 0xffffffff, 0x8, 0xf, 0xf8e, 0x6, 0x9}, r2, 0x2, r3, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) r7 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000740)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$inet(r6, &(0x7f0000000680)={&(0x7f0000000500)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000540)="3897accc2110f0daab7e791afb1db3298d66b1c5ab93e3982831efc40d551a0f2781ff2560401eba97863a614a35fe95315158785abd986918b1299de17d2821547338010583dba6eee3a3023a42e055a821986a004cdcc7e6d84b5f8242580db6a4578de11e734052239d7b403fa590b64629abd95fa7dc704e5429962f99f14f2accae32a6202762e80d5d67f481e9e5c4a3c8e3dc18db955c13476b521103b077071e", 0xa4}, {&(0x7f00000007c0)="ceb2815758717b157d00cf56bea2815434504f007e92402dbc826bf0aedd028e888980773e1438ba087717cd13c283001a57dca6ec085f3ef2afc6b2233f9a81150255024198d972d2b2269f42d8fb1141f48a9dcdea02298b27a13a5dba6f10652aa84fdbda2b5ed6e449d2552547a3fdf9cabfbcb9463ea0243d4f43ed07a3ccff9f14dbf9e6695b8b86d36df6df9d1afba4e8d005c1131c704b77ea23636b282b529ebe0de2ce469bb4fe36d3f65782914b4eabfa80be87f583dc74e8ad541f8903861bceba7b57d5319e57e01e855435ae9843", 0xd5}], 0x2, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x60}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8001}}], 0x30}, 0x20040400) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r5, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r8 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000700)='cpuset.memory_pressure\x00', 0x7a05, 0x1700) close(r9) r10 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x5, 0x0, 0x20, 0x7, 0x0, 0x7fffffff, 0x2, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x3, @perf_bp={&(0x7f0000000300), 0x1}, 0x8, 0x3ff, 0x10001, 0x1, 0x8, 0xffff, 0xb13}, r10, 0xe, 0xffffffffffffffff, 0xad20d9a7e691500f) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r9, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r8, 0xc, r9, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:36 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "006c000000000000000000000000000005"}], 0x28}, 0x0) 23:07:36 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x2ad) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:36 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x10, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000640)='pids.ma \x81\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r6, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r7, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r8, 0x4) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r6, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r8, r9}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1e, 0xf, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xff}, [@exit, @map={0x18, 0x0, 0x1, 0x0, r4}, @ldst={0x3, 0x1, 0x1, 0x5, 0xa, 0xfffffffffffffff4, 0x10}, @ldst={0x2, 0x8d5f39db5e3eac70, 0x7, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @alu={0x0, 0x1, 0x0, 0x9, 0x8, 0xfffffffffffffff0, 0x4}, @alu={0x7, 0x0, 0x0, 0xeb6107ee895c6d6a, 0x0, 0xfffffffffffffff8, 0x4e584bc5d3f2729d}, @call={0x85, 0x0, 0x0, 0x70}, @jmp={0x5, 0x0, 0x8, 0x9, 0x7, 0x40, 0x4}, @map_val={0x18, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000300)='syzkaller\x00', 0x608, 0x70, &(0x7f0000000480)=""/112, 0x41100, 0x1, [], 0x0, 0x4, r5, 0x8, &(0x7f0000000500)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0x6, 0x4, 0x4}, 0x10, r8}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r2, r10}) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:37 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0074000000000000000000000000000005"}], 0x28}, 0x0) 23:07:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20000000000000ac, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x19c}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) socketpair(0x5, 0x3, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000100)=0xffffffffffffffff, 0x12) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r2, r0}) 23:07:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001680)={&(0x7f0000001640)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r2, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r5, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r6, 0x4) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r4, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r6, r7}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002a80)={r1, 0x10, &(0x7f0000002a40)={&(0x7f0000001a40)=""/4096, 0x1000, r6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002ac0)=r8, 0x4) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000001940)=ANY=[@ANYBLOB="0001001e0100000e90712b507e67e100191400ffc58a7124b1af00000000000007ff272e2efe5efacf596e640054f43c", @ANYRES32=r1, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r3, r9}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES16=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x5e, 0x0, 0x0, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r3}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r10, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg(r11, &(0x7f0000001600)={&(0x7f0000000040)=@caif=@dgm={0x25, 0x80000000, 0x20}, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)="1114e5a371e37df0e33a97df8b3003a0a2ac4e4c958dfb78a02677b14b961b", 0x1f}, {&(0x7f0000000100)="a546d33d77a8c86014d6e1e0c80cbf46a29e97ff3e03021aaa02efba547ec08c6f3ca1fb42c120c47d83ac9361016bc8c886d200dc5030c5d554830803c891", 0x3f}, {&(0x7f0000000140)="dc75898421feb14ee3235efda8fcd80e55503a3f79addfbd6693b2dc2bfa2b169c772717f2970d388cdad6927ebfb74a929703f842856d43aa786e917953b4c01a8449f3", 0x44}, {&(0x7f0000000280)="fa76f83914f9e3adc8898a6c8cc67d751616cf5ea0d90c0ddc42f3a5ad21eeefe5a1d8e63606aaac468d55ca8c710661c49592ca6f7005ec44b6a4b46b7c524879955387083b3d03b7", 0x49}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000000440)="4ff115ce71e63f29f8fe4f3209901da2e58d1f91a9d53cda7ba30a40e2084eadc086690d2f08304b80ef248abe98e1dbea65c40ca84e164d214ee03efe70e416fee891f2512600bc0d721cf3d63be386dd938e5df395693c537bc3f2ef180706fe9de573d013550c7c57c7d2ec5fd3613e2144f09538002ecaf313cbfc6eab0d52db0103d9821aea8632ffffaba0872d338f33f30c581fcadf3e99d329f39c7881cb48685fadc7f54fee1dc59827b85fefee9b1485577a2446264f505cf46c8084fed8bda7e895da69c6e0d3a48fa8e5c61ad18061c3f81a888dbfdda59f", 0xde}, {&(0x7f00000001c0)="bd5f4da0a60e06c91dfb7d34f1", 0xd}], 0x7}, 0x1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001900)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={0xffffffffffffffff, 0xc0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000001700)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000001740)={0x0, 0x8, 0x0, 0x6}, &(0x7f0000001780), 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)=0x5}}, 0x10) 23:07:37 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x11, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:37 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "007a000000000000000000000000000005"}], 0x28}, 0x0) 23:07:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030200000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000cc81b7893a12b33c167474e1425b0fd86c586f1fd31cc3e2a40ca701dd99f7acadcbb4f8e28a0061bbd5cf163b3ea2ae55481dd3e1b1d665427312f75c96692ce0a3605b20ed4636a99b157d90e6c06d32146ecb1b6cfc44ed51f92a3fab0aac"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8c8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x1, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) write$cgroup_int(r2, &(0x7f0000000300)=0x3ff, 0x12) 23:07:37 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000002c0)) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xe, 0x0, 0x0, 0x0, 0x0, r4, 0x0, [], r3, 0xffffffffffffffff, 0x1}, 0xffffffe3) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af006dfc5166a546b580c7a832595fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000"], &(0x7f0000000340)='kyzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xfdb3) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:37 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) 23:07:37 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "fe80000000000000000000000000000005"}], 0x28}, 0x0) 23:07:37 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x12, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000040)=@x25={0x9, @remote={[], 0x2}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="c4de8782b1ffccc9149eb6a9fc4585adad1cae877b6a0e4dadf1299b43b998901d576d0d11882941a3f9", 0x2a}, {&(0x7f0000000100)="b0de384fd2ca26e1092e3e928563347dddb0938b8450ee6f7f2127211694c79012b4085f8abfb3867cccae30c8721994f0f0e44f56b704b9027cb640b93abb68c738fa49ab28ffc542ddc08cdf7088761bbb369a139a2020b5b3562329888c8046fb89a73399b2c4cfed4751c6287c294e6e1909846cbd3185fc4be4220c8e6fea786a3ad8714a41dc60e352bf70e41e8334d8a3a7d465a4fbca5f099e2598ee2cb455bf45", 0xa5}], 0x2, &(0x7f0000000280)}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000400)='pids.max\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000740)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000007c0)={r5}) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:38 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x13, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:38 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "05aa000000000000000000000000000005"}], 0x28}, 0x0) 23:07:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x1c}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r2, r3, 0x1, 0x2}, 0x3c) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa5, 0xa5, 0x6, [@volatile={0xe, 0x0, 0x0, 0x9, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x1}]}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @typedef={0x5, 0x0, 0x0, 0x8, 0x2}, @ptr={0x101}, @datasec={0x10, 0x3, 0x0, 0xf, 0x1, [{0x3, 0xfff, 0xab78}, {0x5, 0x4, 0x7}, {0x3, 0x1ff, 0xfffffffe}], 'b'}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x5, [{0x10, 0x1, 0x5}, {0x10, 0x2, 0x4}, {0x6, 0x3, 0xff}]}]}, {0x0, [0x2e, 0x2e, 0x61, 0x0]}}, &(0x7f0000000180)=""/80, 0xc6, 0x50}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r6, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r5, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r7, r8}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x10, &(0x7f0000000580)={&(0x7f0000000600)=""/149, 0x95, r7}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x20, 0x4, &(0x7f0000000080)=@raw=[@alu={0x4, 0x0, 0xd, 0x0, 0x5, 0x4, 0x10}, @map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x2, 0xbed1bd941c7c7ff9, 0x1, 0xa, 0x5, 0x40}], &(0x7f00000000c0)='GPL\x00', 0x2, 0x76, &(0x7f0000000100)=""/118, 0x41100, 0x1, [], r2, 0x18, r4, 0x8, &(0x7f00000002c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0x2, 0xfffffffa, 0xb0a}, 0x10, r9, r0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) openat$cgroup_int(r4, &(0x7f00000003c0)='memory.swap.max\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:38 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0bb8000000000000000000000000000005"}], 0x28}, 0x0) 23:07:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780), 0x0, &(0x7f0000002d00)=""/4096, 0x1000}, 0x2301) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r3, r4, 0x1, 0x2}, 0x3c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r6, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r5, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r7, r8}, 0x78) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r7, 0x4) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r10) ioctl$sock_kcm_SIOCKCMUNATTACH(r10, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r10, &(0x7f0000001cc0), 0x12) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r11, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r12, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r13, 0x4) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r14, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r11, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r13, r14}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r10, 0x10, &(0x7f0000000540)={&(0x7f0000000480)=""/157, 0x9d, r13}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x6, 0xc, &(0x7f0000000040)=@raw=[@alu={0x8dd10d202e1e0597, 0x1, 0x2, 0x0, 0x8, 0x8, 0xffffffffffffffff}, @map={0x18, 0x83ac19276cd81c23, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, @generic={0x7, 0x1, 0x9, 0x0, 0xfffffff7}, @jmp={0x5, 0x0, 0xc, 0x1, 0x0, 0x81, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x80}], &(0x7f00000000c0)='syzkaller\x00', 0x4fd, 0xde, &(0x7f0000000100)=""/222, 0x40f00, 0x44fe88f9f8728c40, [], r3, 0xc, r9, 0x8, &(0x7f00000002c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x1, 0x8, 0x3}, 0x10, r15}, 0x78) 23:07:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000600)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r1, 0x10, &(0x7f00000001c0)={&(0x7f0000000080)=""/171, 0xab, r2}}, 0x10) 23:07:38 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x14, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003000000bfa3aa8aa2a9e042c7f5081f53e0194e220000000000000783000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff9aa27c0049f072fbcc1b7710472d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d0000e3b7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x8, 0x6, 0x3, 0x6, 0x0, 0x4, 0x1800, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x7, @perf_config_ext={0x2, 0x7fff}, 0x10, 0x4, 0x3, 0x0, 0x3, 0xfffffff9, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r3, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x10001, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x2, 0x3}, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x5, 0x6, 0x7}, &(0x7f0000000480)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)}}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() write$cgroup_type(r2, &(0x7f0000000680)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:38 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "fec0000000000000000000000000000005"}], 0x28}, 0x0) 23:07:39 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00fc000000000000000000000000000005"}], 0x28}, 0x0) 23:07:39 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x15, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f000000b980)={&(0x7f000000b880)=@can={0x1d, 0x0}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000700)=""/99, 0x2f2}], 0x0, &(0x7f000000b940)=""/57, 0xfffffffffffffead}, 0x20002) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f000000bb00)=ANY=[@ANYRESDEC=0x0], &(0x7f000000bb40)='syzkFlle\xbbnm\xebe8?\xf2p\x98\x915\x06w\xfd\x1e> \x8bgS\x1b\xf2\xfa\x97}\x17Y\x94\xed\x9c\x02\xb6]\xac', 0xfefffffe, 0xfffffffffffffe8a, 0x0, 0x0, 0x8, [], r1, 0x3, 0xffffffffffffffff, 0x8, &(0x7f000000bac0)={0x0, 0x80000000}, 0xffffffffffffffa3, 0x10, &(0x7f0000000000)={0x2, 0x3, 0x4, 0xfffffffb}, 0x0, 0x0, r0}, 0x21a) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r5, &(0x7f0000000340)="87187bfaafbcb1ddc4565e247b4d28461f90cacf7c7a5aa28293d72048983d1dc0720dc03447c06d2d5eee5f1aa8fb21734393eb9e52aa55811bc19ef66292ae19e25cb233f383a35e3cc2dd5d66abe7e78902c5f00f660ae88cba62c4fa06301a595817cc20", &(0x7f0000000600)=""/255}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, &(0x7f0000000100)={0x9, 0x2}, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x4, 0xfb9b, 0x4}, &(0x7f0000000180)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x4}}, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000002a000505d25a80648c63940d0524fc60", 0x14}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64054b5a00000065040900056cf89f5ac7290cc963f1de06690000000404000001007d60b703000000000000000034c64c0015917139"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x10, 0xffff000, 0x4, 0x552, 0x218, r1, 0xa8, [], 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r4, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r5, 0x4) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r3, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r5, r6}, 0x78) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=r5, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x14, 0x1f, 0xe9, 0x5, 0x6e090c80f73fb12a, r2, 0x10001, [], 0x0, r7, 0x4, 0x1}, 0x3c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000e00f48d5dcfff7e00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f0000000400)='eth1@em0[\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:39 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "80fe000000000000000000000000000005"}], 0x28}, 0x0) 23:07:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x2ed, 0x0, r0}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r2, r3, 0x1, 0x2}, 0x3c) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f00000018c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)=""/14, 0x14b, 0xe, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001a40)={0x3f, 0x4, 0x8, 0x81, 0x1, r0, 0x20, [], r2, r4, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) sendmsg$tipc(r0, &(0x7f0000000680)={&(0x7f0000000300)=@name={0x1e, 0x2, 0x1, {{0x2, 0x1}, 0x1}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000380)="654e91cdbdc38ae3da8227ea8e27c800fde0f78b8ebd897baa6867da9f5a3b1712e83f68d1477ac509515e41fd9229dfa6d466", 0x33}, {&(0x7f00000003c0)="b68f622673389f2e1d0ee83f7e41172fe43f321e9e3a2e3e66105097d0cbc698bb0caf9afd2de3e456e9f4e5cc999edf474d862ffdafdf5f6a6fbf5874728326a50b2273cda42bc2ac5bfa310cc54f81b3eb4dbd771f2ceda64aa0322ffbdc68e3c874e64b", 0x65}, {&(0x7f0000000440)="3c0cfc5e1422e1d5e2f5daf9fecdcfd99c564f1e4b9ee2e5917774e56d8d899809c109ac6fa4407cc26d4328624aa9a18127c42a07555630f508c212765060c6269a810de507e435ed557c397228da0838a85fd9ae59a8fd05aac225818f3292487eac7788b72425ae74aef276510357f81c2889cb778fa391e55d504e627a46", 0x80}, {&(0x7f00000004c0)="24e0d05f1d2aacf3066cffb7ef690d4bb6ce9e940af97ffbe077c75ac89173cbb789c4f6017f02c22d9877c7b1af30113408", 0x32}, {&(0x7f0000000500)="bcc509d1c3326e33801ba9a9c6bf29fa42c5631fe95c1d1ed87a0a50afd99897c546f34c80967aeb0ef0e51a30440c5e830aefced0d31b0a735a19387addd60392626d1e1dc6664f62cfb1964fee2417ad63f2f37ee485ecca7b62dbb890a8f9168468bf5dc2fdb3a33784365700afe59f9d9a5b82eb732eac75f859b9b2899b75c33d9e0497eda1593fae760ce83e1eaaf473d8b543830bb16da1b46ae208f7f9591e9f8b6d67cec1727f029f13aeaf03efcc3de287ff46be0daef9c26f298a5b4c2ed1161aaf0deed8fd42ce30ddf7dd22b78925ae173c95dde33c95fb1e2058", 0xe1}, {&(0x7f00000007c0)="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", 0x1000}], 0x6, &(0x7f00000017c0)="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", 0xfd, 0x42004004}, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r5, 0xc, r6, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:39 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "c0fe000000000000000000000000000005"}], 0x28}, 0x0) 23:07:39 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x16, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:39 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="0c51b28d9f0cd8226872bc2a6b8e05d8b34cfce9052785f21f5bccadfdc059bcf448440203c4a74b742ad2f965018dc9d3c98ac1f1fea9cf86905d5f1bfdb348a9fd83f68b3450accdbbe5f4bfdf0f2409d5dafe4e0815bd780ed90a966b6ce17b1ae5a20c8e06dacafe5251a8bd0bb7c756407a6c06493787a2be8b73011181df55e404f6e10a599be5e3ad9df5a8f1c05b7aada1d2c0203b634c9f2f60c01426f7e25c0467d5af0751f81d03ba1b694d5c360415b461b04b8a223d96634421547fabc59caf9587909adf95b59436ad", &(0x7f0000000280)=""/126, 0x4}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00001000850000000d00000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000b2a2a212885bec9ac7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000009c0)="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", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0xfffffffffffffefe, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:39 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00ff000000000000000000000000000005"}], 0x28}, 0x0) 23:07:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b9607809145d4f3ff000000", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x2b) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000006e80)={&(0x7f0000006b40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006d80)=[{&(0x7f0000006bc0)=""/234, 0xea}, {&(0x7f0000006cc0)=""/132, 0x84}], 0x2, &(0x7f0000006dc0)=""/172, 0xac}, 0x30002) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000007080)={r3, 0x10, &(0x7f0000007040)={&(0x7f0000006f40)=""/235, 0xeb, 0xffffffffffffffff}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000070c0)={0x0, 0x1, &(0x7f0000000100)=@raw=[@call={0x85, 0x0, 0x0, 0x28}], &(0x7f0000000140)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x8, [], r2, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000006ec0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000006f00)={0x0, 0xb, 0xa5, 0x1}, 0x10, r4, r5}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x11}, 0x10) 23:07:40 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x17, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b70000004f0c4612fe702582a86f35d3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6886, 0x40}}, r3, 0x3, 0xffffffffffffffff, 0x0) recvmsg$kcm(r2, &(0x7f0000012900)={&(0x7f00000125c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000012880)=[{&(0x7f0000012640)=""/166, 0xa6}, {&(0x7f0000012700)=""/96, 0x60}, {&(0x7f0000012780)=""/230, 0xe6}], 0x3, &(0x7f00000128c0)=""/11, 0xb}, 0x2000) sendmsg$kcm(r1, &(0x7f0000014340)={&(0x7f0000012940)=@can={0x1d, r4}, 0x80, &(0x7f0000012f00)=[{&(0x7f00000129c0)="b7924940a0bd62392c82c31c26bbe2612cb8bc64431ed0ec9fca59f3e99b0347404a0b55434efe329d1470d6754d40", 0x2f}, {&(0x7f0000012a00)="5d76985914daa48772637f6e67d8e13d005f51fdc966b0ecdc208f5ed6264ed185537f0c80b466ce1c1b91531e6ed262208f31fe4534ee3cabc0567e09296ddd3b30", 0x42}, {&(0x7f0000012a80)="e8d36c5b4303614d98b4c32074c5f32bef6db0bea0257820cb47b7a456e0507a95cf3d77c28d24185903ead6377aa0b896ccc823db44186e93efd943449d6ecff7d1ac3b774e230dfdcb932593b46998dee3f3cca4ea54dba18b77838055235dc62fd677f910e44791fafc5a02e26b98d3ebc5158bcc3b96cc9719658416ad92b8cfa1540e850c770378f408a2748a390f8d775fe5f11a55f127e4e2a03af3d1ffa8bf421c0c5bf579d7332d2e283f10d3190c0c65583729e4051d28500432c775d30633832733d0359360a337a5bf7f81ed0d32499e877d8c7a7d", 0xdb}, {&(0x7f0000012b80)="6fc1a76e8345618ebad6f476cd730605395bf911d3727b038a2b11eeca060ae699cda74548ec1f77605b54ee422b1a12b8909a89cca12558c505ff238d018f52375190510216817c6be115a5c4b24be18d9aa2f43ac29452cb6b1903008e1813f41df767d38422564ca5771954a6ed18ffb7b0969f102c736e98f9bbf2cd6ebef5838437ee6845ae8e84bbe525850bcd9a0d33cc16c901084e98a9c61dae2e115254ae8550beac4ac018d9af135585ea70d58c4070b1f1d6f5ab0b482a68137e3b556195b848895eabfb87d64c044a8fea0eb2697ca1d4d288", 0xd9}, {&(0x7f0000012c80)="b005fd44883b4610144ead62a055985d54b4127d942feec598adb4e488668f1cb769e343e129b15b2f55dc7f11b6341fc4bed1e53ca9ed2a319f6b1c711b03ac3232b624d525fbc36ac65c1607d16b5bf91f4959e5cb6abcb51e626cb79e5c974cb9c47427923421fb302093bf9de73c24ec528c1c9d017c2e22a5e0529230e72b18325762420170115554e7703a3e7c248fbf1658280b341394daa15f7513555585a2d7f3e78b1df1e2148ec0064cbddb669261eae5f135f58f8ebd", 0xbc}, {&(0x7f0000012d40)="728a7c665c4730dc7043d9562520a79c939d5429cfcae82077a92b02c4b95407b2f258f3f4ba68a7397be80014e3f3769f6ebd1d7d161a3854625d32dd3a4d87ff5acd596eedb13d88e176b2b91919ea3417b2e869dc5b260c25a01ae8f96cecb1c2d8cabf104dff9019a632c15c8bde84255ade6e7df0b629bb1547f7d403de180264f8c5b73b51ac6d4eabc612ebf336d9615af635a83f08d0d01e943fecd788834a247c205a9e71ef3946953ded32bc3a845e83f4a97f425444cfa7104b18656e4cc6c24dc30c85c18fb1", 0xcc}, {&(0x7f0000012e40)="08fe5a311d6bb35c54d4e28c59df13812808822e7658e4006d5320320b3bfcb46455816f975a688e7158be173ad994c02ad9be6ab9cab37a36f34b770bf99fe4009025d55df4f6", 0x47}, {&(0x7f0000012ec0)="33d72b229139ab9c22b5681decc250f4fccc814e6a30", 0x16}], 0x8, &(0x7f0000012f80)=[{0x70, 0x119, 0x1, "6eaddcae696cdd7c13019b5127bda80cc162f533ad84659af47b207d5352e27e0152c3e008e346c43abd8be176cbd1eadb00d21b000747c33b959d8d6f420b7c276d68d409ed39d819c3de866f714474f3f35cd92b1c4df4e2d369"}, {0xe8, 0x105, 0x80000000, "a6e3317cb954567d33bee9d8492b3c96c8b9ab0f20371ea41dcefbcd09e9261ec740aca505af9831c4e05e456adc233f32026b3aee3d242dab227bbaf33a301156f391af20bf9b3fa260b07edd2228cb875b244fbd2372839fc2da594bb00e45e4bfed9cb06c88dfabfa767bfc4ec611f7d568b5f66416f1575e8bd0cc2ba8572dc037f85a356b87bf9b5ccfb6cf2ce2ccc145f8f66388d76de1c47e86c2e0fbb764da3788f0295e361c75f99a8acfff3f67f8f2d047b64c66db1b2e68bd29ebc1e2245790c02da9089ea8ee577e5d0c158e23de038ba2"}, {0xe8, 0x114, 0x3605, "095742205f1be40743c60bb6ee33fc33e9cca422ae407b5b33f876bbe19310f2864401fb3b4da17fbf562540833e5889def471652c2bd68a0c030755d806aaa03add50667a5ada512e43048c443163cfc0c5df2999e33d5d6c411c04ea3dbde75b8bd0f4bd0d6ff1cd9c8b088b9cd0b7f08fb9d3e24d8706616d4c48a8b6c2c0ac5cb818dcaf0c1586346dc8d8686cdf04b15787bc458fe16a9b8cd34599743ab8f3c7510ea593ce265cc6c3e11c8bcd3dc1c566d21d85d738fea23bb1c1b34c179594126a9529d3073278551ff34b8f47086438cadc"}, {0xd0, 0xff, 0x0, "c14605bf1bbe8e9287e0b8cc496ec39858cb99d7548a7934c529025073d3ff57231c00d49d63deeec9ece8e8a28421b2b3b1cd3cc94d7321431eb88a8523f191d86684a47328e098936b370111644568c2024dfe2ea962061b60fe0f20cf54afde4c66ff47d69154c742eb75941ae2465a78d3e22fe33f671b1e5023b8d2410539d21df5bd687ab935fed854e28b359dac04aa08b5132ea5426e3a0855240e6dc278bdbb97b343f73506f3b7d7f9df517a8714aab9f63ca4fcae757e6d1c"}, {0x1010, 0x3a, 0xf6, "3f7f87b15fe59fe9ccc899ceff38b2b954903c4b687c64261751faa7000486fe5f007fd6bf9a3556edc3e1dae24c173842bca3b81827b35eaf46d9ee996aec5e32a8d893fc0e1520d1d58c4767e5c04817b0267eda4b57f428698d24b65b00866efb47d65cd7c404e17e5b5f44daa52dc71f7192ae80e8d027c7d6541d7360aa16ab5bccd93df8b382b20d3152cb5a768f8f92d191ee7060ab3b55ad066f1ba983dc12ab712245827c6e85552e8b9045e6294c9e722566ba93b7e973aa4a1e0a524c56a19ee627e7139851f061f1751792e84668d03698e7524c88756a53e5c6ad9291331980d3efa49345a3b74a4d0d0d9e5711d72fb7f5e2effbe839413141dfd84e2ee1565f0f1b235f1dad21afb8cbfc66e33d2fd95df73cb9666b8a403e5524482cda224f47739f575b144c4c2eb421c02b3378b31206fad9670f5015efa0af9ba76a6fae6fa43e284489253d31f8a6e29086c45f23c565a4b2a42da9a164a37e63409fb12a11ae41c6225896b14821475e6cf0e92e9a0b526292bd2fc52012afb99b12b8b2acc69a2f49a63d538c4591788a9b83fd739e719bc4daab1242d8fd5569eab90a38ffc5cfe1cc981efaf6af1202953f465719d26444f878792e88ad6d5026d633f75d045d94ee68d694d76f4733774dac8b86c13189f55cac18a34d8bd09239e6e681f5eb7b86b4e4d5ce61e5e3f8cc39eeeb6ad7f87e8d3882a2b83a5732a88ad711d23b4f555f816497ab8f331a297c05d88cd9d7e220870cad879c81e9348466ac50e70baef97a46ab49569a9d9a0c020a529b524a533fe68c1b9f7daeffc8bcc0f0150b0bfe8b6e0ecb12dde0a8947054aa2def57b37cb18058417626ad2bec5e34a3eb56e7fd31a1eee6dfa5c5c97b0c5641caa857f6b2c7f806f8a146d7f17be535afa9f57281c3cbc7e04e7068f985b5349936056ffb64d88e86a0bb55d3ffe5d8818422c3c36957d7a1c1dee273c6237b2be153071941cd0ce9c69a21c5b279163ee9253f999f1b5bee38f6fdfbceb122d0f4987f81f0a449852b2bcf5e98b814fde36bec3cab75de7a41f3e4213b2efc5a972f38c0e879d308297b49a87341996388c37361ce402b5fbeec3c42c0847c856e60b1cebb3949755a023c1556c9edcb4dfab270531658d21ad186d0ee21bb3bf174a70dd7de62d66d8c3fa048ae09e69f5760de3e9df2cf34a3e1b7b7a82a563d4cdd64bc3cad693df0c4b7cf72574f9e107f79186495715084a568a5c5a02e2c953c227acec9082fec3968d3676a8e17d60b1773f32b7eacb34dd1cbe2f485c49996221d6b35378fbd15a621ca3e59d768fe15def45f52e5c481bb77b289062a26876641cd977753ebf090b48c45d4c1939b29609f39fcd3f5342c18150bd46eaf46524859b66ea7eba2c495fefbc90e4824c513682ee509299e6ecf347ceea9f5aec43901dec9334b2ce3e70a0fc8f2b52a2f70fa7c684770d2627ad78591dc01f1fc0f3c915136f2e49a471e186bee44f5883e036cc0c2068dc3d68752e327f91256bddfe6ea0b00b708c6d99c41efd54a766fbdc25ba3a77b2a0a20a68773d8d9039678f52578bf7af38af3f87fb5beb1750f4b6fc792baf59d44a9493a6f261c2d01b4e57fa5d4ea51b88dd14e28a7dce86cd16967a33bef44bb6ebab4e157bc97331371da7e746f0dc1e0ee00845007a5ed304916df242e6a504fb9960d54197e6d206b860011b0dff01b9ee0ed2758295527ad3c3c1c66fce6f657ee2bb84663216798db42aae7af124dc4b5c9e0310a1d0f3a05de0fe52879ca9731ce7d43899ea2eecfa05efd9e54a8b500116cb8171c11a2a0a716bff2076335f11bface6bfc7ce44202693585db91156fb71c9a91176b2bc94734edb24b69ef0d036ec6e52c878898eb9265267bea84364e1336becb9c5928def022f336c2333371279632ef42c6ebd6ec4fef6ca4832f4be73aa843c2d8b411b5013b78067866e0678c6cae58c1cac9cfcf4b663174963422977043598700502ca5d87273c9c2c3d0b4b3c7cfa8d6f4e2dc38f2c5545a0c4235fb3526e3a67d602c27b5eb372b4d62b4c4e19b998606a3dcfedca89e58a68dcd32e20391bb0aa57956a59049ca762a4ad2f81f30dc2976853a6451846ec437cfb9574de6458e907cb29206d3894e60024e765347c9c2f3b606f2b8246f99cc93227efef5d394221a7451ddaee02699d3fae4b388f58b98a6747f4d37f785b7232f0b3678b83837954e9ae765831efe6ee3eaced9d2b5e9f882b04632fd552834da4d5b6d92c18a00355af7d92d2bfcd86fbfaa668d740ad409fe468a26e99b56072d6bab0e5ba84fcac6f23560313de349e5d4130ea6f54f4959917167abd5f0cb701b1984d15792a5d3b9159c904779554f2a44930007356bb10fb5b8980d462371892a4b7e6f0de658994dc832e545cc732b4b5b66f854b61aad6bedeafed7c31051622c40fb4020a726e20e7fc2bbcfe7c8823790f4f732e476df72715212b6a36186d31818ba40a81f0666c581cf03ccc92865b9fe9e3d92800658d95605f07ebf6926edf15d0656ab4e31c4b34b0142e984f6e445010b90efbe9c077ec2292192f0c512f2958c6ad73b63afcb1b4597a411bb621fe6a79b5f9d2f644f088cf325d3b7e29a12724c4878017b99b2d27c3b2b0ef1be2954dd10f8ea9ae414f481614b0da333fcdb6c3437a620b707538412aeae77912e2b5bdc62ec7ccccefbb4109e5a4293a89bb2489e75d572ba1d52f8b30516367e0d9057ef63b0c60545f2a952228322fa6b2de54326e02f40366638750038ce5e798adcc998b06d8e898e4bdf5d106733ccbd93144b54776b851cd11c2cfc1047a7511cbd16311633fe286ec8d26435cd6aa6ad39a2422606d9854b387ab5f450ad05fd7912a8fb7d0529af6fa5c5e5265429caac54ba8d1be78b18466fcac9ef3aaef504f4bf92e52e04d4a48f9c5e9ca79bd9b935c65250ba48526e1a3b982cf9deef46009b7f8472937de9a04cded179ae6fe8ec8f679e7edf3aee96ab98a1042a70b811ce0fbb30d1720fbf300b337a328cf01e836ddff9a80a57d7a649a87c29a42bbc5d44e71389fdcae6e50cdfc812c16080eaebafb9ca8ee254443b1659e2e546f49e0a4c0878c08b7590176bd80569851b608836c4ef5836c62c582cf8b1b80b2cc137366da21146d0a98798256cc03cfad593b6735ea15a865360b08d5d2ffabf214442dba03556ed848eb51a6067b94d5dab6c82296c02c8da99a07f795b66d2b0884a7863af97b6eac3dba94652c6acf8eec7f031750bd59d199c400295b7975291502b39ee45876a0ae99760910483b77a61cdf6860c34849390801d7b4b2b87d908f41cce258632f6d8d518e4550c826b83513cbbe2a39fea1c64fab5c7c24395571c3e4960dc88099ff7b079a27cc51910fe195668f4043216c369f128f89d4696008b99cf69c93bd613536407db88788a7eb79bb92c06cbb47b28b0f0c5d0f378a2de9e45c5ef57ae62a15ae6c18d50dcc944a4ce7c34b96c49e9fd532000757db8263a66d9fa2933982ce95e2ce4c98abb7f50c0bd62d7b3f402ceadb9c6a48f6b84fcfc9c19fbfb63d5fca5d031db6195d4543b6d24029c467250ca691462f05f2b7c8e86ebd405cd64bd824701f0beb0b0d8b0cf84493d66850feb76198777553c11d21c3dd1e659d416e00c0ebe166cfd551a4197b2b13bb41da7359aea79893cbe59716a51fd372e571e8d518db28d3f5449db7b83a3ded392f7fd07ff71ac00ab61a889c53e462ea609814f5e7de33585b82aa677444eedb46e620eab4815d3bde50452a1d9b29d2326ef4aee00df52fab30b01f635b4029965a35b0ceb1dfca13c050bd74563eb119c802c6e7258dccd34f15d905cd8d3596cb5d14980ad3b5364fe8768339ed6da1bd78edf6e25c27d120c23a3a55c3c58a6bb71ccdc14b84937a5ca42a0c6b5624f98a5765d5af9675041d82f54de481cf043da7de4da555fc9cb8590daa2aff86b2bf14b27e0b76143bbde17cdb78670ea447e385e60c2f6a959571d6ea926c20ac10ad0fad5f79697257cee5e4388cfd50151519ab7a253429ed04dcc12a36d6b05e0066da3f63e87330b0ad177929529ce169c05153dd60a349e562de931993eefeccef0a2220c81ffc2250640dbe63d5c13a089b6d17b0c2335900fa4dff13825dd6f783e9cdff26997e322f72de94eadc853e21cae7881e601dacc4e9957a6e70fde5e27d9de44dbf0283b3f19b2d3df16848bb1a13daabcfbfc880c5276d631cee1489903a34769309e2c9c90fed2b91d25e0fabf91e7db48f9b6f9c144342e34fb4a94b071763e717fbdc876a6271f8b1d193cf83f2c3f988692f6382fdd7e94b747287f24dbfd85f1d9c49f03186ca06f034d1b1e3b3de412affaa0e49dcf0d09f3ddb182b30b300a117078d37cd1659a3c7fd2f433b0217852343f2da007ddb3e66e0bdec167a16d933e626ed78067d165991f84c5730810d8353515dc2bbfd54cb6ededa68f7ddcbcb2f91d10577663242cb4f428bed1a87eda57bbf24c1b290d870becbca4d5e7ccc4c28727d21056f9b4fcf5515cbb951a504e4b77a03b7ae02271f754fc69a4b99fe09055ade6808b5ed33b87cda02e6e6ae52234233d9367c1365a685134404b75c1c0d9e4dc16f71b57e9a79a0a0951c9c0b6ee1da71e0433f4729de9d27daeb89326e7903b1f194735ec778215b6e2a8d91227548efe75f60a2c3189d0f45f6650a4e4aec71565827be3226366b890b09ebbdaa64b0f95c5ca2d2b5ee08a6fec53479f0e9be91eac27e9287d4dd1d1c7d3c76c2147c3f435e622350be075569a502f717b85c28d3ccdd4aa46f77c0f4336ce99c9cb8fb11dfb6240a38ad6c75ea61f595b631d350fac9746feadeb85e37503de1a2771391bc34b19a4ad2feb06aa2dbd449db5e1b0db4e8b8df1a1f96f322d8c08d97ef9eff384295c678c0dade5781a8d3c41901ef87c2cf353978eeb391e80417cd723ad6a543a49f2a76f4950237f48c4c749383c427d9de244e42a67f9e6b654545593fb4a533f7e2c017eb30f64b6708a3ab2ab75589ec49fcb4710390ef76f9947f22679c767aa51f5fb5badf23dd81aaf1733b5e92d865901b1dc26d5b3900faf6925c34c5302925520af7174f7cb2c095457b2097358978330308776d309e67dce1e9e2799fc0b99476efae7f73e60ffec751262ce92726c8eca2eae0533ccea0c60a9d22f37d140ae464e3a3a38cfdccc3b36a024b63ad0684244ef666457fbe7925fa27709bf5cfdb7f1d443b463f00b10f6fc3b1dff642b344a349bf78323ec8e9cb52cfa85e05cdd09aef4d93f171973b8f7316c3fc242c2c2a3d96289f77e0b9f0ba9cf0f4988084975f7a5a003d7a293130bf17181c705436f9a71d24f5525f9e65384ae08a7b18eccf70d4d0852894ca70ed4997d4fca2ab09f3151acacaa0072c2437d3eabd865e6f577fbf81a2dad46689619bbdb1e90d130d03fdbe5719b061d6dd1cfc372b50bb1ca882b0753cd5e565d535c15d79d8e1c15cf5ffdc6f49bdbf1074f16571818b1f3222db3bb95203d4fdfb3735a954f76f6b4570a19a79c33c3f1d8bc33aedd751a984e66f0830d38e8c881de6a20f58649cd95a7f9669580ae252624afe2528b50830422d1baddf048da862fc423121c06a899d72e4502dcb07399b45ba5c5ba5d84c0f1c138e3ada80ac8162b77d27a838a5c127bb45c8107349e69621c1d07f69899a315529db89554f3bf8ce6639c68debc"}, {0x98, 0x0, 0x7fff, "0c4f53822aa4b086d8f57e1e3ad53d96a575063cfbd6b2a80f9be14663c8e4b8ece1c16fa528d6f3c559d26978ca58a763cc9aa8636f68f6390f06630cfe9dd895f819781828ef39e86252fc36bc586c5f061f1c2651a60cdc835ed20f253b53ffa650820b731f935f7bbc4f5f4f650f874b3a15532c83fccb8e45db0f214cd22790a5cc8abf02"}], 0x13b8}, 0x28010000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x8}, 0xc) openat$cgroup_type(r5, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:40 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "1000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0040030000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b73bedccc961938a7702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff0000003bc7a174ca0081b9c6d900b7060000ffffffff2d6405000000000065040400050000000404000001177d60b7030008000000007a0a00fe00fe0000850000000d000000b7000000000000009500000000000000b60384a8d9dadd47444a9e79127d3684401982696d6d4cb08f4e4ba9ced1701f714fc7c85136188f4c78"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:40 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000040000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvmsg(r2, &(0x7f0000001c80)={&(0x7f0000001a40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001ac0)=""/72, 0x48}, {&(0x7f0000001b40)=""/144, 0x90}], 0x2, &(0x7f0000001c40)=""/52, 0x34}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000002d80)={0x0, 0xa, &(0x7f0000000400)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0x0, 0x2, 0x2, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0}, @alu={0x4, 0x0, 0x8, 0x7, 0x18, 0xfffffffffffffff4}, @ldst={0x3, 0x3, 0x1, 0x5, 0x8, 0x30, 0xfffffffffffffff0}, @ldst={0x1, 0x2, 0x0, 0x5, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, @alu={0xb, 0x1, 0x4, 0x5, 0xa, 0xfffffffffffffff4, 0xfffffffffffffffa}, @alu={0x7, 0x1, 0x7, 0x4, 0x6, 0x2, 0x1c}, @exit], &(0x7f0000000300)='GPL\x00', 0x1f, 0xbf, &(0x7f0000000480)=""/191, 0x40f00, 0x3, [], r3, 0x1d, r4, 0x8, &(0x7f0000002d00)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000002d40)={0x4, 0x4, 0x9, 0x9e1}, 0x10, 0xffffffffffffffff}, 0x78) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:40 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x18, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a7db2b24558ad9f316306d80af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000004000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000003be40742b55171ce780000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000004c0)=0x5) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0x26, 0x29, &(0x7f0000000400)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x1ff) 23:07:40 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:40 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000100000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)='9', 0x0}, 0x40) 23:07:40 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:40 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "a000400000000000000000000000000005"}], 0x28}, 0x0) 23:07:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000300)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 23:07:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000480)=0x4, 0x12) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x4, 0x0, 0x4, 0x2, 0x0, 0x9, 0x4, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000300), 0x5}, 0x20, 0x7, 0x8000, 0x0, 0xb79, 0xb09, 0xff}, 0x0, 0xa, r2, 0xb) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:41 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:41 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x2, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:41 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0003400000000000000000000000000005"}], 0x28}, 0x0) 23:07:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x4}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:41 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "a000a00000000000000000000000000005"}], 0x28}, 0x0) 23:07:41 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000003000000bfa30400000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d010000b7000000000000009500000000000000ac5611a97ca253dc02d9fc52cd98e556df34b013bb55e0fc71c12fc6b1b671b91cac8b576e9366f47c3b2ad0515a2aaf3a9964c7d539f9f7e6369a4eadc43972ed67918108d692910264c5d03966d3448cead6c3b7d631e8365164e366d9108af35e5754dc2aea4392c2294e1593ba9b332a1309f0d2ebc5e3037b597ba915b3dd67e32c2ae89f3e228f3064e4cab1e30dcd696794a49f942aff8616ec7b835c7981998c91850719210c3846055c537969d0934da882f9a93782333f80e49137d5fcd12f8083ff90365f380192be14369ca9c8a800ddaa109491925db46db6fbbf56d77e6938c5bcb2c91eb6c05766ff9d926820d5de0fd9778cb89fa0f3e6203f608774d55c685afc08ddb5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r1, r2, 0x1, 0x2}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.events\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xf, 0xb, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6e2d59ef}, @jmp={0x5, 0x1, 0x5, 0x4, 0x8, 0xa224fa96d321883f, 0x8}, @call={0x85, 0x0, 0x0, 0x17}, @initr0={0x18, 0x0, 0x0, 0x0, 0xac, 0x0, 0x0, 0x0, 0x22b}, @ldst={0x0, 0x0, 0x0, 0x8, 0x1, 0xfffffffffffffff8, 0x8}, @jmp={0x5, 0x1, 0x2, 0x3, 0xa, 0xfffffffffffffffe, 0xfffffffffffffff9}, @ldst={0x0, 0x0, 0x6, 0xb, 0x0, 0x18}], &(0x7f00000001c0)='syzkaller\x00', 0x200, 0x5d, &(0x7f0000000380)=""/93, 0x41100, 0x6, [], r1, 0x2bf58c31b0264797, r3, 0x8, &(0x7f0000000480)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x4, 0x4, 0x9, 0x1}, 0x10, 0xffffffffffffffff, r4}, 0x78) 23:07:41 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x3, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r1, r2, 0x1, 0x2}, 0x3c) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)=r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0f00fe000000008500000b0d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r3, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)={0x4dd6, 0x502cbe90}, 0xc) 23:07:42 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) write$cgroup_type(r3, &(0x7f0000000400)='threaded\x00', 0x9) r4 = gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, r5, 0x0) perf_event_open(&(0x7f0000000380)={0x7, 0x70, 0xba, 0x7, 0x3f, 0x3, 0x0, 0x5514, 0x80000, 0x88de88ea3bd00c9e, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80, 0x6, @perf_bp={&(0x7f0000000300), 0xc}, 0x0, 0x9556, 0x4, 0x0, 0x5, 0x40, 0x3}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:42 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000100000000000000000000000005"}], 0x28}, 0x0) 23:07:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bf230000000703000000eeffff7a0af0fff8ffff20000000ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7031f0000000000000000fe00000000850000000d000000b70000000000009500000000000000ffe348e58dd92393f4441fea59b827afe7db08a0979e217d8559a6440d211e6d88e8ea7aca3bbbcadb6bb9d9abdb8dd221feadcb1649f6dcb9feb08be54bfc7a343dcfc6505153d2493f9a25480cdca325d4110f1c2f88061d29698a6483402f0125f815b4aa05b06c784227db2185a1b8da374dd0449cff9106318c00e70d44ca1362e03500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:42 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x4, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:42 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:42 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:42 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000200000000000000000000000005"}], 0x28}, 0x0) 23:07:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0dff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b700000000000000d4c0000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x29, 0xd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x500, 0x0) 23:07:42 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x5, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x10, 0x6f, 0x56dd0a78, 0xffff, 0x20, r2, 0x5, [], 0x0, r3, 0x5, 0x2}, 0x3c) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) write$cgroup_pid(r3, &(0x7f0000001cc0), 0xfffffffffffffeb7) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:43 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000300000000000000000000000005"}], 0x28}, 0x0) 23:07:43 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x325, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) socketpair(0x9, 0x1211687ab0ae626c, 0x5, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffeba, &(0x7f00000000c0), 0x1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x368}, 0x44006) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="0600000000000000000000000000000000000000000000000800000000000000"]) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x73, 0x3f, 0x8, 0xb7, 0x0, 0x7fff, 0x93a2908253ad3515, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x200b, 0x1, 0x1, 0x5, 0x0, 0x20000, 0x9}, r3, 0x1, r2, 0x1) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000040)) 23:07:43 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x6, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:43 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:43 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000400000000000000000000000005"}], 0x28}, 0x0) 23:07:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x7fffffff, 0x2}, 0x10}, 0x78) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.stat\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000880)={r5, &(0x7f0000000740)="9d9d6454c6d64b0006b520327f26fdcd2af2afad63d2b1577acbbf0639b9b5d26d4690d26d491f7dddc336a448d0ceaffd5bea3baefbab9171ddfa244f11c37f6b2aa4fde5a94054df3c4cc71d0e60d321dc48e45210f522e8505ce858559ef8b905b6a352e5c0514080c2dc1201490f748fe9e34b444fbf3e7cce76ecfb944d71b0a8", &(0x7f0000000800)="3f00b9f79a1c45755eae48113a744ccfae75a6e2656f81d7b8aa2f84aa76dcf21cf92f1fbe785b43ae8fcf4de272729b4cf0362c9de3d4969a87ce9d9ba181c4aaf218ae9def5f37bcccae784ee8c2d7413050ce12b854e5ac98d4156eb88fb7ec98a3a0b1", 0x2}, 0x20) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r4, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r6, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x0, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r7, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0c0583b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="0f01000000000000191400ff", @ANYRES32=r4, @ANYBLOB="f0113150fb98170b98ed00000000600000005f898dbc2b4a432dad59442249d7010033ad94e7a4c513ee88a602df8d16e490d77ecdcd66058b89ecce5a6d504c73c4dda80ad3f7ed4712f68439c640b2b111550bb3419f3e62b2ebee42a8b85c1804098f4b48ad9d60231854fc80cf23a602004f2f2a4083326988d84706f2c875114ab28862bfb75b0225e30d77e2f2df"], &(0x7f00000002c0)='syzkaller\x00', 0x1f, 0xa4, &(0x7f0000000340)=""/164, 0x41100, 0xc, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x6, 0x8000, 0x8}, 0x10, r7, r8}, 0x78) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r9) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r9, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1a, 0xb, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @alu={0x4, 0x1, 0x8, 0x8, 0xa, 0x1, 0x2}, @map_val={0x18, 0xe, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xa}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x10000}, @exit]}, &(0x7f0000000140)='GPL\x00', 0x5, 0x17, &(0x7f0000000180)=""/23, 0x41000, 0x5, [], 0x0, 0x2, r3, 0x8, &(0x7f0000000280)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xf, 0x0, 0x1}, 0x10, r7, r9}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) 23:07:43 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x7, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:43 executing program 3: socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:43 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000500000000000000000000000005"}], 0x28}, 0x0) 23:07:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x400000, 0x24, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x200}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() r2 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001b80), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x0, 0xffff, 0x101, 0x0, 0xffffffffffffffff, 0xffffffff}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r5, 0xfffffffd, 0x8}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={r5, 0x12, 0x30}, 0xc) 23:07:44 executing program 3: socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x62, &(0x7f0000000380)=ANY=[], &(0x7f00000000c0)='$\x92\xc3\x8a`\x16\xae\tCq\x00\x00\x00\x00\xa7PIs', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x1, 0x7fffffff}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) 23:07:44 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x8, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:44 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000600000000000000000000000005"}], 0x28}, 0x0) 23:07:44 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400058100000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) write$cgroup_type(r1, &(0x7f0000000440)='threaded\x00', 0x9) r3 = openat$cgroup_ro(r2, &(0x7f00000005c0)='i\x1b\x00\x00\x00\x98\xd6\xf7WA\xcf\xf1\xbe/\x03\x7f\xeaj^\x0e\xb6\xef 6\x9fs\x92\x9e%\x11\xe5\xaa\xee0\xbc\xa8\r\xbda\xdd\xe1\xb7x\xe2\xf6\x89\a\xf1\x05C\xd6Vx\xffW)I\x10\xf2Mmk\b\x87', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = gettid() r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb01001800000000000008000000000000000002005beaf469f4cc064d00080000c8891054a869d2cd8f26873620ddddc67f987dfa793c2c7b30ffff65d798dda751944c9558903096aeea3cd3fdcbfa936e6fd7722bc3c57a0381c6c9fb6f40c70612384b0f21efdeb119bbbb40c4f5c128f4b77367de42cd1e7e9620a2fb18d550a286305f0f6622d79784d5959c0ca9126453b84d419e2a8fe37f52216011619fe7fc6d70822d2a579de5336c7fd65d2ad7acd6e494524c02d37450d72252bc649f0f5ef4acfcd74338932141376a763a0e8fcd06bdb5a8821f012cefea57c0b1a3051d80bde9a7e0323c79dc0e0c6e23a9d993b8b4e8116a07ac4d8885875fd0d6750655fa265dc40d160d415ff7b14745af7f0b9661b34e"], 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r6, r7, 0x1, 0x2}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0xa, 0x1, 0x4, 0x8, 0xa90676e3dcf6dc83, 0x1, 0x100, [], r6, 0xffffffffffffffff, 0x2, 0x5}, 0x3c) openat$cgroup_procs(r5, &(0x7f0000000400)='cgroup.threads\x00', 0x2, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r8, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r8, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:44 executing program 3: socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:44 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000700000000000000000000000005"}], 0x28}, 0x0) 23:07:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={0xffffffffffffffff}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r1, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x1e, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x4, 0x1, 0x9}, &(0x7f0000000140)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x7ff}}, 0x10) 23:07:44 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x9, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300000000000007030008458bebff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe000000008500000100000000000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000300)=0x1) 23:07:44 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 23:07:44 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000800000000000000000000000005"}], 0x28}, 0x0) 23:07:44 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0xa, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x10, 0x6f, 0x56dd0a78, 0xffff, 0x20, r2, 0x5, [], 0x0, r3, 0x5, 0x2}, 0x3c) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:44 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 23:07:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000f8ffffff0000eeffff870af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a01fe00000000850000000d000500b7000000000000029500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:45 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) socketpair(0xa, 0x800, 0x2e, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)="23bf830ce9c5ac5c1e0b0727c473b83e11133967a326fb8de38803586c71f90f62770c81ffcf301a96edf0d33b8c08e6c64d9fb2b3d69f1af305798312a68cbb54c8d54452acd5d735c85d373915eea897c04ad4fd82bbfa5b8bcc638a2383aa3d2f198909c78f78aa727bee8bf03c2185d5b231731ae50ccf542a8d3223f0da4b4c21a9d48f9ad9643213929920504b", 0x90}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000004c0)="a862b8d0ad91bf04bd2d3e2512fc071a1c3a0361ff9dd4e6ba10da3865a0edceadff96afc6", 0x25}], 0x3, &(0x7f0000001d00)=[{0x68, 0x110, 0x0, "5d00e5954ea259586ff25b826bc1e8387edaf66db4b3016d2404c33d260732d1ce776aefee63f474e54da807140684fea2944a13c2a013b5cf21c9ad54749b9aa45a22be080312ada06a559cd4c9e090b826fd75cc"}, {0x1010, 0x112, 0xffffffff, "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"}, {0xa8, 0xea99424f18b6fd82, 0xffffffff, "5289d9f7a5570856316f87eecedc5dc403f61dfa71a816ed8b9231b0457fc34877be57c6f6eeaa0021ac1511782cc29c456361cf3f306ecb1ae6cad2523ffc3bd101fc6cb656914d66dc08e87118489413b477912d52819b9ff9c938956139f7d7dabf91ef9961a9ea3435b364b9783ebf2f684e2ec6f9d3a70fdfa060426999cd7b4b33ce3c61ad882a7623271b2f7e90467ce0c631"}, {0x68, 0x0, 0xffff, "94384683a6114d855940e36f92a60aa91fc66bef091dde07ce102b5ccf901e28ee7b0a625a38003c7a1be68c4b0fa51423979a24d29dbcd20e08a1952fbe302ea50b1c2cc29de750c38e624988680e4dc48fa1020e2c06"}, {0x108, 0x1, 0xd5, "3dda2ff848dd3dd69cabfb95c44a9f5ea330d2abb320fdb97af55eaa1f5d785672730ddd6859b81122b7a72d652c4224d15c15b7eff730dc57d0516bdb8c1bcbf08b0bff1eff9b1079575806ad946ee29f50487a3b5a7239216fb62d5c1faffc0dd6b860f2c77aa542f5d6771f2ab9dbd8a8b4f601522688bac17b2f8152c92a30ac76e41bf804443e87180b9368989aa21f30e8a71c505d61d46cfce9f0c79a85d36e832c903e36b9ed66d616a7d11a3b32990601834a8a6ce5e7805a95c745fdd464afb2a985ead8815e223888836afbc389fbea3647bb80c649787cb1420fe1be1b242ef4e8538211c7e9a20bf5a489194d3f208c"}], 0x1290}, 0x4010) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:45 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000900000000000000000000000005"}], 0x28}, 0x0) 23:07:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:45 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 23:07:45 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0xb, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:45 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000a00000000000000000000000005"}], 0x28}, 0x0) 23:07:45 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:45 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0xc, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:45 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000e00000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x10, 0x6f, 0x56dd0a78, 0xffff, 0x20, r2, 0x5, [], 0x0, r3, 0x5, 0x2}, 0x3c) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:46 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000001000000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300000000000007030000f8ffffff7967c6ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b70360bd7f69652505e6631671c00000000000007a0a00fe00000000850000000d000000b70000000000000095000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) write$cgroup_int(r3, &(0x7f0000000280)=0x6, 0x12) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c6, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:46 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0xd, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:46 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000001100000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffe}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:46 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000002000000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000009000000000000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000578196863266a1ead45e2c363e6450766dd5a1c74fc2c81d27462620c5c37e247b4205780ba86e90146b622e50b039b8b24e65f0a6b319df991391ef092bfa27084dd89c410a57441cd1157d44d13ecac657103b27cc0a019d82263b2f6a8c9f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xa6}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x9, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x5, 0x4}, {0x8, 0x4}, {0x5, 0x5}, {0xc, 0x1}, {0x7, 0x5}, {0x1, 0x3}, {0xb, 0x1}, {0x5, 0x1}]}]}, {0x0, [0x30, 0x0, 0x61, 0x17, 0x0, 0x5f, 0x39]}}, &(0x7f00000004c0)=""/216, 0x6d, 0xd8, 0x1}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r3, 0x0, 0xa, &(0x7f0000000300)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r4, r5, 0x1, 0x2}, 0x3c) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000600)={0x2, 0x4e20, @rand_addr=0xfffffffc}, 0x10, &(0x7f0000000640)=[{&(0x7f00000007c0)="6762ef6f0fb44c8245c679d31519bc7e042ce2f7ef101edafe87fa2eb5316e5cb39e900d5e588ef8b0a2af14bec7b98c3e5ae5c30514095cbcd7b990dd58dd8652de5c63d314f613137d2d9be65046cf87a2e418c68bcceac1582929dbe160077ce5b5c518185e4e8e597afd3e30c385fae559ca0807603b701ae295e45000943939e33ee510ec1d819a825848e67c9d7dfa1ca12871c85dc8139b14cbd430e6dedeb93838a7f5fba93099148537d940bb1f4c67bd7012811233e5", 0xbb}], 0x1, &(0x7f0000000700)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xf8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xa060}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}}}}], 0x70}, 0x4000004) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:47 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:47 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0xe, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:47 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000003f00000000000000000000000005"}], 0x28}, 0x0) 23:07:47 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xe, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="950000000000000000a40100ff00000085000000001f000002000008182500000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\t\x00\x00\x00'], &(0x7f0000000480)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0xc, [], 0x0, 0x1f, r1, 0x8, &(0x7f00000004c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x6, 0xfffffffa, 0x3}, 0x10}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r2, 0x10, &(0x7f0000000700)={&(0x7f00000007c0)=""/202, 0xca, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x19, &(0x7f0000000500)=ANY=[@ANYBLOB="b706fd7dd027ac0c08000003000000bfa30000000000050703000000eeffff7a0acbb652d60a34e7a4a0ff00000000b706040400050000000404000001007d60b7030000000000fe00000001850000000d000000010000000000000095000000000000000000000000000000000000aedc4065032f191afb5ff13c16bb43cae0103468542360d783d318138cfd242f07e2e9dc363558df6d708b26938118acd5529787f71cffdefa4065d99eb2d0fe6882eeb73c7495c3cd13775fe17034462aa207c70000000000000000"], &(0x7f00000008c0)='syzkaller\x00\xdaz\xec1\x02\x9d\xec4\xf0\xaf^Q\xc3l\xf2\xcfv@Dd?o\xc2\xa9\x8e\x86\xe6\xe0\xa8\x90\x94[\xf1\xa1\xf1$\xbe\r\x03\xf79n\x9b\x1aQ8\x8b\xfdw\xb9(\x96\xb4v\xdf\"\xbe\x13\x17\x9f\x81Hf\xeb-\xfbs\xea\xfb7\x85Z!\xe8CZ\x1d8y\fB\xd1\x7f\xb6j }rl8j%T\xbdg\xaf\xa0\xc0rS\xa3\xf4e\xfc/\x1a\xe8\xbf\x10\xd7O\xee\x05\x81n;Z\xf3\xcf\xd0\x04\x83\x18\xc2\xf1\xb2\x8ds\x87\x014q\xc8m\x06.\x1c\xc1\xb6\xf9c\x97_\xd1\x89\xfe\xceeb\xe5j\xa0', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, r3}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r4, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x31430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) r8 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r9) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r9, &(0x7f0000001cc0), 0x12) r10 = gettid() r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r10, r11, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r8, r9, 0x0, 0x3, &(0x7f00000003c0)='](\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r5, r7, 0x0, 0x12, &(0x7f0000000300)='./cgroup.cpu///z1\x8c', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r5, 0xc, r6, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:47 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000004000000000000000000000000005"}], 0x28}, 0x0) 23:07:47 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001e80)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001ec0)='io.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001f00)=r2, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000001a80)={&(0x7f0000000400)=@x25, 0x80, &(0x7f0000000700)=[{&(0x7f0000000480)=""/82, 0x52}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/86, 0x56}, {&(0x7f0000000580)=""/104, 0x68}, {&(0x7f0000000600)=""/131, 0x83}, {&(0x7f00000017c0)=""/188, 0xbc}, {&(0x7f0000001880)=""/241, 0xf1}], 0x7, &(0x7f0000001980)=""/216, 0xd8}, 0x41) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) recvmsg$kcm(r4, &(0x7f0000001d00)={&(0x7f0000001ac0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/228, 0xe4}], 0x1, &(0x7f0000001c80)=""/41, 0x29}, 0x40010020) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r6 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r6, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x10}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[]}, 0xfc) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000300)) 23:07:47 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0xf, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:47 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:47 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x0) 23:07:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702fbffffff0000bfa30000000000000703000000eeffff7a0af0fff8ffffff79ffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000000000000000000000000000004ac94ea69b559649308ebcead264daef2f5c304f21a1c1824a5e3fb092981466243e8c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0x1000, 0x9b, &(0x7f00000007c0)="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", &(0x7f0000000380)=""/155, 0x3f, 0x0, 0x26, 0xf1, &(0x7f0000000300)="eb451b36ad709e00e500bbac92a2ad966988399806e781cca63fdb6e41c43727601c28452dbc", &(0x7f0000000500)="22e454cb0d0d56277537f93bb7873931d9443a542d91fd60fb98a465bfc73d0a34691082886d520d75d9299da92f7d1af56dcb94b6bfdd1356933b897f0e6d2076446b50098447276686e8ccb4f48f95657755c966be5ad07af2a0b8119925ea8d462595ece30be5a4cb10af751fd4bb44b0474a47c4e16a9a36febd98f3864b6c46fed7fc7ab2d59bc4a293d9b73c769b42330ead17058f4101607d5aac820b7a1059ac06f7560bd3b8e23f471da84c76461c922bc305688321548db8ffe042dd0390dafa7e25ec789c77b2cfc0257aaaae5717060d87a6c0b26ae12801dc7bfa35bcf8df3aa0b3d1b1e3707cec735312"}, 0x40) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:47 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000004800000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x10, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:48 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x0) 23:07:48 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x11, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:48 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000004c00000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x22}, 0x7}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="89a28b3e0e3bf3a69612b7a4eb506f83db7ff227a49655010134083aea8468d26289ba69b26cb809a9e3f7fd43ee940eec36e9e054dcd060cb39ec8628b54df077be29edf9b4875807819dd436fb16617cbd89af13e3164f633903beaa97191774986f44e88dbd535634bca35c1b67ec36e44b286440bf29f3e51d009f5f548dfe8a2a413993d400420a9f81f006f165b7ddc45c3c1ca6cb40ad2b299fa305ea929c75283e1db38a56228a220c3404acfa73f1cf4176562c5e7c513d267ff710698a0cc2f871b7c3827a1c70672dfe9a51fb84a02cbd4fc2835075f39f9a30608a7e94acfbd82d62210237e8e42cf2", 0xef}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000440)="c4415c9bd87e19b8dba46be521980c9aea57c17a979d40c1bdfc418158e612030ada199edc548694ad176ced4aba11508af7407c12acb0f47b0950af8e26ee875451408daf8f01cc98137eafd7b791c640d80cf311effa01bc288379dfa671780dcbc14c501e14f580f89f815019c42bfabf430a89056a413d269f15dc4c949c2a82d90de27d27cd98bb5c394f72cf570ba3e231078c250b8acf2f2f33975d9b588237406b1629a1fd43c3ee333be9ac92ca36", 0xb3}, {&(0x7f0000002600)="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", 0x1000}, {&(0x7f0000003600)="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", 0x1000}], 0x6, &(0x7f0000004600)=[{0xc8, 0x88, 0x10000, "f20bb34085dae671205a1e4d3edacbf794677a120999437d1cd4b97f5938cb2d8fc577987c8dd9bbd47043b163a2a0e189c1156d9768291a76594424f93731d21f173e3858fdd0344431fcb47fc33ca1958cd291c0f125cba3510fd51663fdf6f26380c49495bc6e6f1a9a11f0cfe7c4fbd9554447007176628221b9ebbbd8ffc6ad68beef1055b6c80719626a0fd2fe48712eded23aa73a3aee158700dad24e2babe7cbd88831e0a1de00537882d4d552f77bda5f78"}, {0x108, 0x10, 0x20, "8625ce267be91729542864f9285f586d3eaac09e5bac644c084d1f552ed669be0bddb4736aa1615a211eccaf5c79b82a70a8988754eab964573ba420dc3ce11200106ef64550139e7fce7800801f0ff009ce7cda0ddadb943f8ec2735c66082e424350a5e1400ac821a98ecd908d4f32bdb4e5a729be1c7872702b3b2ecf88dfb51e053e67cd2dd95a0c24b9156f1101d42cb43bf5f6c3a8f992a72073d7e88a17bccbef1281dc2bed9b74d7d74a0dfd729858496fb3b2b45944937d0aa7b7f53302d222cb33fb08f7bd80c45c0f58651286ce732fa2c781800be00cd28e2937053645316e5204ce5baf91900d931638426fe4d312fb"}, {0x18, 0x108, 0x7, "60bd00ec6f69789c"}, {0x100, 0x88, 0x1, "982d24b7c911085561a756442c64b10e57c5c14ff1017fe1d2f13a8fe64a898837e8ba391616c41bef24fbcb7b0acd7d25307c24bbfcc7759552943990331a3966b3230e2cb431aec5d129df4a1a9c333f0ce428656194ddf89d0366be0676e4cfa91109f518b5c171512655abf6daa50d2bdb126120389b601b15ae3e1695a82ab87feca7134a7a6742065449ddf869932f4dff9006251667609fcc0fb3b8a68243888e0fb6e7c20bb8883bedaedffc596eb7071cdbcecf9dd8a204dfe8c85319115a2431cb3d3cef7c79dcd29507a813a004f094ec4d235defe2e8f1262df799c6f502e7c03dcaca2ca1fe63fe"}, {0x28, 0x10e, 0xffff, "b8bc07de08266b68aa5e7acd52aa2bce15bc71ad76555fc6"}, {0x68, 0x116, 0x5, "1effb2dcba3f9099d722e120c0d244b211ba20dc80b2c31ab20f7e332c98a455379f6ea5050865396d2f6c4fff14e41a2f1758e860e19c3b3780dc95a7ee31824c89c45dd29bb949756dafb33227736d25c9e42a583a"}, {0xd0, 0x168, 0x4, "3d57f7c13f27039f6f09938b27e2c27ae762154453ac7544a10a2893d095e78ac3c6a8fb52f7084c63849257305f75909c45d86eaa62c4a3822cd37f8f4cfa0bcca72ae39507cd9180de87fe8bd761f504ec8bdda7c1bce30897c7988e7ff443d0c7ca7209e3f9e7ac47d22ed55bb1a2a277affcd5975587b8edca0e557ac0abe3bf70b23be0da48379ba566718bd26f88de6d22833345c98f69d378727d2b4f1504588e2435f80e2891956833d173b0ce665bea532904b093ad86d1"}, {0x70, 0x104, 0x0, "6e917472ddd54f5321025175bf933d05f1168499664c40d63e3dfe325de6fe971c2293eaaa4af44f81a46cb659b7ae521b1312746189283226a66c9947e94d99c4a3aa85d1903e2ef02e5076e82adb788db6c27e3647bdd5a894a4c7"}, {0xa0, 0x10d, 0x7, "28ad8d848e2a85ae7137c6b25d6d79ab0cf2d1c7b6f1f0ce495070f07f958ef3b82aad15217be640783d3286116d869b48053ea4fb583568d51054eb300728cebda4e755e39dd77d2aaf653d6f3a56881597676a2bdd655ddbd1f0c43ec009a6dd2518984de89f597a8ef9eca35bcd70a4ad7b4fe864b103292b47e6ce7ffdc0c696da1b31fdf67fbc1c"}, {0xb0, 0x88, 0x6, "52ccca5ae791723ec8edaabbfdac3e8eecb9ec8866bfc8d73bd2edab28fa7ff0170de76c0a9264b7217b8bd7988319b46c55515d99db525cb32dc2cd2c141054e91fc713d78bd2cdd62d2670085b5ebf4ac1d1e658f39ecd09e4f300fc8e2d04136ba5ff83c4d86e53feb5b724537c96c6261336f43d59873b723edc39dbe0b4f8fb4f4e939b8f00fdd1d090e18f639f9295710c6dbc7ed106140b464e94e6ea"}], 0x608}, 0x20000000) 23:07:48 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x0) 23:07:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ffd4685622fda31325faa5f73e9900000000b7060000ffffffff2d6405000000000065040400050000000404000001007d00fe00000000850000000d000000b7000000000000009500000000000bfff7e4afada81b219e8a9c09f5a1324cca6f762148f5ed2de357f7cf7d2581844f4a219b4ee7ef879a539c5828a66f88345ef26d2ef8b8fb8b7bbf82474001b604a93a773e85574cd2986e9b843a72906b64060d4dcc67f8610cfe4e509ea9fb21abe25c334df5a471894364def3663e5c9efb1f0358d1ca64fd15ab3f1d8c6e3756efa68a1a4d5fcac309491f157895b7179043c84ec252937d6aa40e98d731ce9d2d37"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:48 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000006000000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x12, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:48 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 23:07:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:48 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000006800000000000000000000000005"}], 0x28}, 0x0) 23:07:48 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x13, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:49 executing program 5: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r1, 0x0, 0xe, 0x0, &(0x7f0000000400)="ff871b965b1da0500c079e9145d4", 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000005c0)="8c", 0x0}, 0x40) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x22}, 0x7}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)="89a28b3e0e3bf3a69612b7a4eb506f83db7ff227a49655010134083aea8468d26289ba69b26cb809a9e3f7fd43ee940eec36e9e054dcd060cb39ec8628b54df077be29edf9b4875807819dd436fb16617cbd89af13e3164f633903beaa97191774986f44e88dbd535634bca35c1b67ec36e44b286440bf29f3e51d009f5f548dfe8a2a413993d400420a9f81f006f165b7ddc45c3c1ca6cb40ad2b299fa305ea929c75283e1db38a56228a220c3404acfa73f1cf4176562c5e7c513d267ff710698a0cc2f871b7c3827a1c70672dfe9a51fb84a02cbd4fc2835075f39f9a30608a7e94acfbd82d62210237e8e42cf2", 0xef}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000440)="c4415c9bd87e19b8dba46be521980c9aea57c17a979d40c1bdfc418158e612030ada199edc548694ad176ced4aba11508af7407c12acb0f47b0950af8e26ee875451408daf8f01cc98137eafd7b791c640d80cf311effa01bc288379dfa671780dcbc14c501e14f580f89f815019c42bfabf430a89056a413d269f15dc4c949c2a82d90de27d27cd98bb5c394f72cf570ba3e231078c250b8acf2f2f33975d9b588237406b1629a1fd43c3ee333be9ac92ca36", 0xb3}, {&(0x7f0000002600)="c7fdd327ac1c7b6c2a9cd87f3af77d574852cdc9316adc84fa4f5e14b0ddbd443acc2217f558b8508277e28cd54af5f4c5c1a474390ff33d4fb5a2849d4f991ee111eee59c3a2b945c38ab82a4c76abe655b383779258247a2bcbcfe8948254c7268c58bc65c34749b9d6ec2f302db32626184797274bc0b631a7574e51fb9eb6b4f3ab2e623b65c2215d2937435736d67c82d50ca91347bc7cc2f9313f25c1341af94f2c0595a534201ba2fd034f39a52038d7721f6ca892f9962160ff9d3cc45dd5ceffda72eeb501037c9082b56b7f35ccf8871cc3fd3fccb8f8066f7992f0e80f45f0266e2c8ed709076c661611713c9077ba8d9a0e8cc74665211559e78026b89d93337e543be096c73c6035ab08e05358fa64378569d82b3856eba0b186e415beb96722b3917f9769a53a1eb2c726ba1801a974137a1d61cc85218360be6e1d0dd007cdf87be125da40fbbeda3a31395cf1eab6d2a11a22bb7d5e855b3335990b82e5cccaf7a7af1e0aa2cc584250b15025a374a0c7cc07d87a523750332d729524dbb0792bbf03ee99a095fa083ede5c8be9c28b87786f8dc484bb2185dc2d699986133012e8b0d8b2feb7076cc1c5300d8e1f166ee2c597baa68d2345c1000cef87adcdc8d3a747cb5ec4d5961f2f4c9dc48623f3bda0778451bd707ab6e66203800f22d5b501dd00e16879afca693720fd91d738f2d499d69d7505c18d0f28bf4877f1261da3f279f6273b36e8364285a8351a96fb9c9af7d5008c4f2cc2cd4a482900cf3c7048d92503832e506fdb725e5e4fa90239c59cc5b2e1138fd3ad0af4d2f9ed3f9595308be2f5face42493cb34b7c93451dd94f3eb67b5a0763a41ec9a1798c7e92265af523f9d060123c1230ae1c7ffd88ea1be6870ff5048220a5a1288cc835f4c52d29b173bc4d74b636141f956475e75dc39342841b272d28102e93085f122089ca3b30a177495fa50be1aa9d6beea8a97d35437e2de91a81a5d0c568d045cef4d7d859a3495e1897343b58540f702ae5a9b6fd8b8a99ca4dbec93a484550d6d7cadb9893ed0d9bf31b16c7cb9f98ae431c26b29c849919954cc6a2c5f75495d1ad15d72a360a5471381be11afacc3f14f20722eb890ca7261cf896ea1baa782d2dad407fb21c2559ea1e3558cd883486b842b8046b2da66ff1e07aed26b219a62ba2e7241da4078e3aa5036fb13394c6aa8a73731cb35bd58cbb17876d3a0c4a4974d9cf6bbd505e08564f1b51a7a6f9020ba6baede61edb9344e44f9c17573e243a994e36bf2c83ca29b4a29a39f279f6b08a7fe1c94b44cdf41c9b869a502849727d7cb544741f12d701342271cdadd84f8663d70044e28ac8bca2350afcb34c398d95dedf3930252a718d34d81e49470f388cd0cbf33d72e4a47403036ec4964fb0f5ba68e646277154b1b0a4deab6c860d1e600a6725792e56eaa450715131c32e1f5e49d917236bdd11a8ccec50783a392ceb46074408d5e9b9fe9213fa63b6ecc8faa85944fa931c8aa7cc21fc7eeb2dbb36a87e28e9f9311b0dcf55356810bc67ded464d76d93b7b3effb4bf033a0b8a8b12cccb6d6a2a6297d65261ebcc1c5aa5b52f5e18dc1c5ae72f9d4f42f49f128fc3e7aaaa631570e47c1f0802e158ed51b4db19129f1949d51c5dce3f3d71bacce0a6c3788ad13a1d23fcf3305d9a6853e341288081970afd094639f670ffdc77428e892d8c4508db2b4a828930c4956c3f93c672338e52cafcdf51899c34982aa510feee15db749c329ad4b630882e4da45723941928a18f9ea613267d8d3cc1cd7910674ca89a3c3d13ea8e69d277457cfaf630723cbb2c95cf9ee8685415bf878cb8ee7f8c4bd5777b1c428c1ed827b03ed3b7f5139e93a2987bdb151427752c4f6080e34db61eb8e93ecd8077f0ac8c2ab993fa1b4d0a3bc02615c1aad4100e879a19e0059bf1885ccf9161acaeea3159df4c2c7cd90f5bc7a1825efbd5eb7028912da14bbe158eb16f2a17fc9b335118854b8eb8a14867c58a8d2e629ea02b1bdb371a4debb4f7b6c0886eb0b3940c59896ec8c0cd4d576f679cd895cc3489a19af331f90ddd9dceead1440df5974d486f0e917efa22569bdba2449b7274ce2c4dfbc07888133f6fc194323117031d6e4ca08a6005173c5a393fbed7874be259a403d5e2e00a35a12aab4d555990090f6a3dd760eac25917f06f86cf0fe84aca23a3bb3d600cdc6003628141b103b31b8f0b95976098575b108c3515ece4e7e31502023d54ceca8ee1e0d6256fcd0490b2d8952e68c16ca29f062d525ef152ff824c7969c5921250d44348a3a0b8ada0f9d1d7b12027c04d635234f37a624ba5996daac81bc3309b6eddf02a8b807004773a5f69f53ad7ad795edcf3b005bb33a624dfa0697d3ebb1c0c99f4e08ce77891b473968cea69b6bafa93f93bc560d7c6f4982b58a39fb85b33b9323a8163e8b976108ce13d7aed10df70569cb87ff7f3d223016377415e9dbdfb32ec2750e73eec140a4da4710eafff06ecfef8a9e0e6d671c47d28142f8b97da272b6a8d0ad9259ae0e0ea516f989baa29cd9b1f933cf782df3b160cdba120341c3c4e7c103d56310e075ceb2de9a097196c5713b209a5e60a3493322b1140156463913c0a782f2aa3ccf374ddb55e6d12e73d4614f8fe812f6ba6d4563009d8a497dbec482ff48834955b61b0393c975d632745668f785e228798a2dc8ff0710d1b2aa01e5d8f80485bbd5bac7684f117a0b7cfd0855b881688ad24167afad5cd9f3c3074c7a13f2caaa43e65d0deb76d04ef13829271b90e87144738471ca642e46c1f4024f270723ab46b413ab92e8e1daba9f4155bc2cfa170eeea1728db0c89eed10443828bc54acb3cccebcb1f99d317422b1e583affbe455b32961dafb9810a51324fae973f12d4987bcc632ca65bb50c27fe0a1fa8be7db93b40dca8a0c11ae48ea2ce757d0291b1e77de6bba6900a7bc90bfdcfba2247ccadc21cd1af1d89c560529305eb2170ee6c6bd0189caf45eae00e4e120bae02959f8802b4c6a2f04cb152cf5e6bf2c5bec4c6b7d9e88ce2a610eceb32e84072bc6413bb7e49611642d5712410bebbdef4b269c5065df1030eb6205fccd517264c3d8c4da961e5a44881a91a8af1d7f450c41ca84c34bff13bb2c0400a05bebcf512a818815726b28f0c536923da364862ab8a7c1021a52f11b8aecfba8c356b4fd91e2be4b90e8eb0212f75c5b709791e6748f41b8b11442277292222f443888658d884bf0026ba90d3df92efc6ea27fc162c2a16eb7fe2e21826e7daf0e2b28cf4af85966728bf9dc59e0f9601e5386bca1ab13245594012d861c6d0d8f444ef4fa57819a7cee0f1b9b51f081d5e94557bacc909cfa7c66aab37c458821436a0790345f744073d50c306a82ef2f6ff712d3b332b8162c18488a8d4af9982fea060e5fad3153708f2e3671ef93a452c9fa605aad5eaa074c94c7b572f4452ee0a06f37e2969ee2d0d86e64b0399c88c03019cfa5f909e2bb940802a4af597ab4b81cdf54ce40fab3a6ba74975a0611f6d2f4f4076e47f6c181e85b18caa73d925f19cfb892c4c454e6f482f1816499118c65d10438571dd5e357cb78b4d652e8f99611ec1bac841b9e919694ecd9981ee56378ff1c4ef393d224599a176db31604333d36dfa579e22070b975915a44df3c7aedd13b412d1b3b32060de3872d32382f2f5bdbc342a45555aed8b1aa33110db1ac512ecbf100c1012f01fc762bac6ec985c838adaf9f9b95acf036b57acb16cdc30eb53f913644fce2650ec70af3ab20ae4d3ed9b475026561e52b12b34e61e46a0a16420b2d2fee136d81c8111da62c2d759f27465d51ce0804350b5405a75d60c1bd9aed80e1cd5f856b19b5d2c8c0450c10281eadd0b10de963cba56701138a6ddd9c6b6bb2656d932b6121d8481eacd89d7fbc2428a4395704789678c8eb7a2597a2f5afc6fce14042f3c96cea51307712829b95f085006a96241b5f2ac41ae5381ac04f4792a246e0d8a8f94966fb8e718767e46908c6874d7bf3dddeac043f412296957d1d6c6238f80f42712f292972142c3f3e328e518e8b1903b6c770d81cf0156a26e787de2cea32a8ae95fdac538a74fe4eba201b70aef5ed0f317af47026cbd1120a034bfe61de4a161f17298131297d8035e65273625db7955643d2a2c2eae1fb2ec26f746f61a838b9760486f45126b871ee95336b0d78c872bcba701b9de110ce03803578755ba5ebace502216fe9c14c403ea4db00d8a67bf30d123c4057386e0bf78193b5bb6560b0cbc14e2b9992244501477e2b2c38a2bbfb82a4cc40ebde172dac235936d7f0ce10b47a83de1e2bad1adcdbc40986a9f73981054e3f9df329afc410e8c36bfa18e92632de76f9bc29fc4d02df7bee3d7e59c66848f9dcb421813e7b1e42f79e64a6f415878d89f00efdc6d2199bb8523351808ffa0f8709ab4337d16402a9d8b39c84911ba3fbbd7c74a7b509180c179519fb472e47229844478923c4fa204c684a99fa08fc51cb7fa49643411ab4f3e0526aae5c64af9643d9d990a495e6b4b21f95e5773047a9f78419b7807f69e50aa4d077f51237e783db0b5f177c325e3ae5682fab2986bdce4a35a0439c2968ea6224a357b4e6a3b15f05bfcebbf954c931d6d6b142ccaa53271a34d2179fdf6ac70dcc6b4b77a591c6d9689bd15866185b12d9021e0ee3d25c390039009448b27baba1fb659b6db1182482ae8cc9cbb607519fa31ee09bdc9d6b7977f9d6f667e675919e80dc675f455d7edb178a8b161bc9728c619e161b25f9c4e3d72e71b3fc59f9b54e7a7b4051e1904f03ece8c945e42c25ea948774317743309ec6b4bdfba754e053369df46d4d40ae428ef79606a1633b875fe92f81b37d0193a6247ba96d308f8609ce2db8aca595b249ee2d627696ed9a973df7c264f2a45b5d579ccf1fab4f9e27cf78146e4c502f0567916e3f457643cc5802f48a014c26adad42bb1c23f0bd238a09bcbc13fa59ab40927ba34e10e7eaccf634c1537754023d276bf4b1b8ac619f19c7967bed0ad115d3f1cb6ee323cd564ac531e6d1544405208866a0ca22ec127417c4ae6bdeec413dc4ad1b9bbcb1ebac55e3355b5508ccc8d84391f6eb8cec936e212134ed5a97b22934a12b30b5217896c388ab13ba4676a8c095c3783fb533c759530bcbc7fc827876ddc7d37a17861d2db5a9c5bdd4224a4b325bc3ddbe27485250069c98efade42e75cbea0f608a41701ccc8c7ffd516c7eea5d184b717a5dfcc1c009220adb7fbee4be197618bbf49ab6414e047d4fadf260a6649442712fa3c8f54e3410e421602b4f4b5ba4341fd967646c369a718ca55d9ca8dc10af8c284efb6c6305e7eca525205288a33ea00ffd3ebf5d9b930d29ffa2c08e3ea6cfd565e95e18b45cbd416bf200566913338f16fb46ffebbaa479b0711b1b41314624595313b28efa88a811da40e0aa6cb9c8184a8547d6a35267f4c07260633aa215b1e154a9c1feafaef4e4c395d003ad92f348d4bcc56ecfe5afec92d656f841ff5f59f379c2919971c2b3c25c12017cd7925390048a783e1a623363412b2fbaafdc32739163eb73e9fe513c5fba4b92b1ca59ed82f0d62375cd06a8415eb5e7c04b34571796191aef0b5bfb2e66a77412e098ee7ae607256974332884b67aad94d9ba2e36cdc333ca185b3aec0883e862d467cc02f20c9b86508e85d94011716077b9e363dca122efe0e4ec920b92530929d29190eebf551d34ab3", 0x1000}, {&(0x7f0000003600)="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", 0x1000}], 0x6, &(0x7f0000004600)=[{0xc8, 0x88, 0x10000, "f20bb34085dae671205a1e4d3edacbf794677a120999437d1cd4b97f5938cb2d8fc577987c8dd9bbd47043b163a2a0e189c1156d9768291a76594424f93731d21f173e3858fdd0344431fcb47fc33ca1958cd291c0f125cba3510fd51663fdf6f26380c49495bc6e6f1a9a11f0cfe7c4fbd9554447007176628221b9ebbbd8ffc6ad68beef1055b6c80719626a0fd2fe48712eded23aa73a3aee158700dad24e2babe7cbd88831e0a1de00537882d4d552f77bda5f78"}, {0x108, 0x10, 0x20, "8625ce267be91729542864f9285f586d3eaac09e5bac644c084d1f552ed669be0bddb4736aa1615a211eccaf5c79b82a70a8988754eab964573ba420dc3ce11200106ef64550139e7fce7800801f0ff009ce7cda0ddadb943f8ec2735c66082e424350a5e1400ac821a98ecd908d4f32bdb4e5a729be1c7872702b3b2ecf88dfb51e053e67cd2dd95a0c24b9156f1101d42cb43bf5f6c3a8f992a72073d7e88a17bccbef1281dc2bed9b74d7d74a0dfd729858496fb3b2b45944937d0aa7b7f53302d222cb33fb08f7bd80c45c0f58651286ce732fa2c781800be00cd28e2937053645316e5204ce5baf91900d931638426fe4d312fb"}, {0x18, 0x108, 0x7, "60bd00ec6f69789c"}, {0x100, 0x88, 0x1, "982d24b7c911085561a756442c64b10e57c5c14ff1017fe1d2f13a8fe64a898837e8ba391616c41bef24fbcb7b0acd7d25307c24bbfcc7759552943990331a3966b3230e2cb431aec5d129df4a1a9c333f0ce428656194ddf89d0366be0676e4cfa91109f518b5c171512655abf6daa50d2bdb126120389b601b15ae3e1695a82ab87feca7134a7a6742065449ddf869932f4dff9006251667609fcc0fb3b8a68243888e0fb6e7c20bb8883bedaedffc596eb7071cdbcecf9dd8a204dfe8c85319115a2431cb3d3cef7c79dcd29507a813a004f094ec4d235defe2e8f1262df799c6f502e7c03dcaca2ca1fe63fe"}, {0x28, 0x10e, 0xffff, "b8bc07de08266b68aa5e7acd52aa2bce15bc71ad76555fc6"}, {0x68, 0x116, 0x5, "1effb2dcba3f9099d722e120c0d244b211ba20dc80b2c31ab20f7e332c98a455379f6ea5050865396d2f6c4fff14e41a2f1758e860e19c3b3780dc95a7ee31824c89c45dd29bb949756dafb33227736d25c9e42a583a"}, {0xd0, 0x168, 0x4, "3d57f7c13f27039f6f09938b27e2c27ae762154453ac7544a10a2893d095e78ac3c6a8fb52f7084c63849257305f75909c45d86eaa62c4a3822cd37f8f4cfa0bcca72ae39507cd9180de87fe8bd761f504ec8bdda7c1bce30897c7988e7ff443d0c7ca7209e3f9e7ac47d22ed55bb1a2a277affcd5975587b8edca0e557ac0abe3bf70b23be0da48379ba566718bd26f88de6d22833345c98f69d378727d2b4f1504588e2435f80e2891956833d173b0ce665bea532904b093ad86d1"}, {0x70, 0x104, 0x0, "6e917472ddd54f5321025175bf933d05f1168499664c40d63e3dfe325de6fe971c2293eaaa4af44f81a46cb659b7ae521b1312746189283226a66c9947e94d99c4a3aa85d1903e2ef02e5076e82adb788db6c27e3647bdd5a894a4c7"}, {0xa0, 0x10d, 0x7, "28ad8d848e2a85ae7137c6b25d6d79ab0cf2d1c7b6f1f0ce495070f07f958ef3b82aad15217be640783d3286116d869b48053ea4fb583568d51054eb300728cebda4e755e39dd77d2aaf653d6f3a56881597676a2bdd655ddbd1f0c43ec009a6dd2518984de89f597a8ef9eca35bcd70a4ad7b4fe864b103292b47e6ce7ffdc0c696da1b31fdf67fbc1c"}, {0xb0, 0x88, 0x6, "52ccca5ae791723ec8edaabbfdac3e8eecb9ec8866bfc8d73bd2edab28fa7ff0170de76c0a9264b7217b8bd7988319b46c55515d99db525cb32dc2cd2c141054e91fc713d78bd2cdd62d2670085b5ebf4ac1d1e658f39ecd09e4f300fc8e2d04136ba5ff83c4d86e53feb5b724537c96c6261336f43d59873b723edc39dbe0b4f8fb4f4e939b8f00fdd1d090e18f639f9295710c6dbc7ed106140b464e94e6ea"}], 0x608}, 0x20000000) 23:07:49 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 23:07:49 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000006c00000000000000000000000005"}], 0x28}, 0x0) 23:07:49 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x14, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:49 executing program 5: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:49 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 23:07:49 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x15, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:49 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000007400000000000000000000000005"}], 0x28}, 0x0) 23:07:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) mkdirat$cgroup(r1, &(0x7f0000000300)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) openat$cgroup_procs(r4, &(0x7f0000000400)='tasks\x00', 0x2, 0x0) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r5, &(0x7f0000000740)={&(0x7f0000000440)=@isdn={0x22, 0x7, 0x8, 0x7}, 0x80, &(0x7f00000018c0)=[{&(0x7f00000004c0)="f261bf043b9c97d9c3fe004c50e13b34e797a8fc77f5db98522a7b4361a5b786a877942db213c8933d672a4154cce8fab9de86d56a90fd553723320a516e745e87a7b81f3c9d8a2894bc9f8758e2b24e2ef683596c2102e51a3d9a827acea5", 0x5f}, {&(0x7f0000000540)="e0cad1dc607a2d17795328d1f03e48b09421460dc99574e119bdd3ed25d99a115e36a8b67b07a1d9b8850ad03d31b61503d92bddff4cad39e8f44d26c28f2c1bd11fe35453322469ba6f931f9f5a8af6d47802ea8b65cb9fc66f94a88852eba37f02afdc078c04db698de2b443b543f9e3772acce5d33b4c3bf3527337e9d8621d5aac9147c24c0afda450df047d5412d1e3a680a0e260ddaa5f2ecd119e592134e9ba6bef6eaac242a3e00fe152e623ae7b6ed175bfdb6044e7f0bc0857fc23e42c422e63fb8d8142c34d383d9210db95f3f6f956abccefb9b54e51ab8f0503db", 0xe1}, {&(0x7f0000000640)="8484c6b37a0c1ac86647bf46f57988f597dd9ca827b068b85d71f569dd9c3458610f4e672d90718455eda02a9626062da74ea440c2867b294e23b1cddb605510f0334280072b48b4b424bbe742e48eead1d24708702c416135dd5fe06f44d824401c785bc0f89b62435d4d", 0x6b}, {&(0x7f00000007c0)="1ccbb09ddf544c9437028123ed13c3b7d4407033b58c4e92d91aa55487902ce3fc698f2c7f798764445a73efe2b17a2cced6b5baf120362caddffa6d07243bfe5e72013c7923bc2b27b9baafaca33d7fdeef6d4ce73d04b11f02ba69f6bc53e299216e40e94a0e590b0b5e29032343a914db2034e6c5b8b38fbb53837bd60d3189120d57977f766f0f1d6d5b454e3e17e0ce5e91c9bd7848043142e9a1d926537a488fac4a5ca177083f2758a87f4b301620cf5bdc9cf47891a3ec44089e6654910ff1b339c9ab8f35290afe643557493acfc0e4b5ce8117536323080138a245f053662856748a5899bd133ccb73067f821912668ee690c80ef4b063d3e33adb66da095b5a12dd3bc64093183e2eb2eea67d45ddb459a775662741cad3813509c59dd5e514ce4a2180fef33f65e6c7d49a7770310538ff9134818c2a04e68ba609cd2363f3d9158453706f2789d9441f52b2a425a53493504bc61445a6811c40696a5539ebaeac995aa855a60c75bf03bfa0ad721b53d8f10d4fc0a122e79b6e75f9af5c8022b80b27c7a52be59931b9c2d1d45a619423c74f139ac16e1632e49781b0bf6f731ca61615d09c0ad5c3e0be69b7396f8d008286ea910e7c56fab9028cdfaabb2183e5349afbe868eccba883f50b7e357c8df8c773bc1adafa284e43917b8dd46e83d068fff3290bdd37feb075d82cdbd081a420ff04d282c0ed8f7519f7ae0eb697f8816c65a6ccb17f6e34c7ea58c287a34fbf1c2e3342d555b91b4ecbe91d77df229eb44af397aee18a1ab6d017651cf992d63423af27a8ca55be6c4ab83a766440f36a5eec0b742a63ca49ea9bbeb4d1b0e696cdbd0ea5a360ea024f8479f2c8ca52cde901596939f080d99d0bc53a4186b3fffcdd373859bc6c4ecd2deca3b81c4b813ea2539d1369442bb3a07db64f66eb2135ac4f20978f2cc30d4d7d1ec04a800ac34765ac9510d404cd97fc73253ca9d07ec6595eb85c022daaa1847de60c8de5139432bfff0e9423c0c66f74d513a1871d77bf751d55ba914ca2fdabec9c1635ce01691811091da122444b4cb78702aae894023130b247402222897d4889e44857ad52cdf103af4474d34b032f289c6eb16e443306117d257b24226e17d878c91b93689a1f9088dc3380b79f8e3386c2bd4c2c39f3d2de80de268cf0749250ea71ee232d274c6fd1d2d99fca3e7235a3cd32cf4550903dd3a444ae9bef98f179af0cecc09449de2fe004dd21672ff29397bd838e73ff8d55beb2da105cc184a73f62c3fe0df334dd80d365eb35ec9ed8ac4389de431c37688ea77a923aa2d65b48be859440ea41d1e9b282106e0c10954f69c981ecff7b2a3db945a90d7fe4ff778b3c186177fdaf9fc6f45d6ef35b4d86367bcd2e7508447f40e8287ffcda46b30310f02edf268eebae3721723bb0b1f63d189bfca98bcd6092b767f3cd9dd246f36ac512ef1cfe7991af8affcf747557d4044c86f48f8fef30f5cfe963c39857195a10db890788a3b0a0af66de4b34e4f58d91e96221046a07ee3b70f6327aebc8296337a448b6adbaf70d95959254bdf3af10bc9c666680e19036c2c0df9b499ae34fb38458272c67cc51eaaeb520adf1e24279af97a918fe7cbd4406e33d862e6c65198db55d6d23ced4a333f5a757660a8d54cc607e96ba49c92c2857fcc4b7b8b3410d6621044c5c4b432139a418576429f42aed915562a54bdac0d9fa96a9d303726cd8193503f4862fc07ee0dcaec395d5cec5cadd8b6aac7aba759af0dad38f3673a0bbe4fdf6378f6b1e10f30323a87f5aa334dc68ccf76bf34574f95ce9aeacd1ae59645d06dca49d9e1c989f512221141cc79ffe0f95968cb4880a8994045b1b1750555ea4cae28aebe10f168f7866961a542ba15c8c4c7d141a364d0d9f9b06044449b554a5c372a11a0feefa5a167ee46ad837373f9779deea010fc1a1136ce0da3acce4bf5f5f2e90098ecde96131a9d34b4ed5e32a6378d0b3168b01d2028cca29d09e0bf0cbc8a189b3686037f70e9484f9134367f31d66967a9332dac39d32583584883c61cc242f93fc08447fe10b65b2e84be4359ae9b10418f872d359ce9633840c7acd5470b81a374602ffc297cc10145047b468bd439fadd08909ac469d43769f99189221de79b817ab6ddb2e635e9031da66c667ce79976393c12b8ce75e793a047c8895ddc2ddd6ad27fceb12aa07135c889c15a7d5b8b3991ec4bc8d945b7d89f2da3bbe8556c279635f97903e8724c6bdd19fe42006bd588c25060263c3cfc8fc2e0a584fe90a4826d364d6011d48736044e70d79b30c4a327d5efb88c1360e0bee36be055b4895a3fbd00a2f9bcd2323f785aa649fa97368ba4d84ecfd3cc276985dc540a77563f407f7d2180b0e012345b469b316a0047fadbc4e7b06a9d9f947da5a458a50ce40291e13e86c47481cfd16bf12e2b08c9ca70d733104d3fa9a5548da934791a80a7c72cc12f1c9125e0adb9f247f51d4b75d30bb9be4b7833d5bbf234e2d019de9884200e70ca2c7f01556d8962dfa24128fdf7abfaad452140adfbe32a28c8e805381ef8ca954fadd771f3eb1c55043864131ef063136d4da6978c46b6b8e825fe9a148f741d538ff8ccb1592148d35191f44958776168fe5cdc4a208c88618fbc1016fce5b2fc30d70276741fd95dbf77f38c2dcdec1e5117ddd875f9cd52067f91d5c0a1e58c3c393f9bf5209b663adf3512faff97e580f04069b39dd053f8ebde6efe1794ab9d691cfabd2e0427b683851ac26bece80a33d54a2640e2c1fe9e986f485bb9d22b8e349e91ce69ebcaf1b63eaf8a7cba677ad07a58dfc44e23670f25b48152f36736a085e6694199434d5a6426a1de294dbff948e0884b748e34be129cfde4baaa0a4f23ab78008c43a1ce07884704904941544ead59e7179051ef492620b8f09edfdbbe4d62b155fe84ee9b4749923214f4e2f3a76f8c84f051d0d42035779eb3c97ad18713cf4982ea587e4bf97dbeecb216a44cda9c0fb114782a225b8517c564c9c3e396c5c474488a860e8085fab4ca24eea4517aabcd7e392e3c9f03a4a822724b23f1236f4e42387b2b888a84a9dfe517e16158219c3448490b6d3c03c29aee927a2f735926594bf49b2b04147e8e1e91e94dc29694ecd0f52ca6e322fc58a4bce5670585f9c47e50fb6bbcaa811eea14e44647c42b87f269286c6cbee9dfc576c44366fad9d83f5df5985d7a6cfd02f4905dbf80e9c2ba7be4d791f05d9906947a5a88937f6a0995d2f78b844f27aff37c5074e49ee5930c9e4cbb96502aad556cd852b0e20139126973505295f35d84f2b68d320db5a1bfca53dab812b2aed53b9c7cc7fad36d8a826badab647fcbafb4673d9de2071a66ef1625ecb0322f90172c7cdd38af0c1424df90b6687350acfe0c5fbdc9ac577340a3c033c236ce1ffb0955b31fd09d2981400c414b4fbec8f1ecd9496dd866c7ff38ec0a7d76813e493a34a9c3907da0b06cd63a509ee50f2f02810315366038da4e1744fb80f482b1b29b820e8878fec318b5444aca212ab6a2b91bf58baa4ef2e0e7e8d3c0aadf458fbc829360aaed58c041edaf3a49891494a76fe6a8373d758a43fad379e7b022948576046edd8ce7d1cf9c2432e33cd56d2c872217d941e19cd9a70273b641b1e63c4fd6452442871b0713013095062531168617f136fda3bc66c789368933ee444fd07f5819d851a88d18781bfb9f6d8710fb0cb8f5fa78771657b5b3936727b4e3714fb01e92adf3b67f3e1480ccf9fe441d3f17f83244edc03f8644319e1faf524e32b847aebcd2e5d528a53a657f778e4614e0b4bd6f08dec00ac61145ecc1265c33c646b2b16ce7c8cc841ade18d549f5be3bcaaffc4584abaf1a62c895f4c7054b9fbc7ec96038dc0f206fa8d43c6e690037a6a59dc6cd6d66bd05552bda01f75e3e06c5c77d6591c8b8e89c409db158c6ebb9a65a94c414888dccb3a897fdcdb9329cc25889aeb278e21bc0fdf53b2a62d5640a23daf4bbf4d8efc893dae3165ba068c4adae376ab5fc98aa8809ba67d7d8ae5caef3c9e0f2c6a759499c3bf05e574f3c95f126c3b49c3b1991adc5399339d40ebff398dab17ea075e9e61a8065065ec8f203fb557f65a70fb79ca97266d2bcbcef698a1699db69fd955cbf262e683a51a5a5305622e3c924449cd15ff3d4680202979b0887d78a7601ec4f7919727b37290ca4433fd675c5ad1a5f18634e2d35c8d759a80aec2431fa85b27294ca5fef7f9d0bed2effc750c4f5a290b19312fd128993fb02cd306aa229ef7e49ad5137e5aa0818ad2586073205236fdfc4f5f60eb387e30859e721c6854774e9349c6a1320cf14a36d9cfbc6399b02f4296b77106fce9a437d74cd83997739a2dbd42722e91f3f7625f3966b5ce6e8a1f5ff5bb585970b2b50dbee3a448c4dd872b6071cf0e1692b4c5fcbede0fc12988584b4c6d9ec0a4dac4c6dbe2713d99870b6cbd07f9fcd0d94bb75d3167d4c983e583065cbab0dd935a758f5f3ec8fc78b1543c7e68c8b472ee19f2ebbd2c7175565de1e0c7cc99cac27b768947d50b81dacc9aa8fa003148376e7fd12e75c321f6cf3ae3f6469f6c34d9d8a809b9ed881d0db297f4687cc8ba92e203ea2e19a9d0ca4dd3fdc9231509dd6f02733d5490941dfdff86ecca03d32afe2207ff46efe5ab030c46a12debe6b62c8686157261677a762f67c44672337fff7007b05a0a3e488bf97dc7e2f162632e08d4ed6a2b09834d7493bcdbaa31648f9f1f28761598161ede04685fc8b8b1f707d544516a8cbc6d91b176fc403ed1c7beb9d43398229109bd10569f6f7fff853dbbeb5453557ed3e659c64ec597d4a52e94176af0c7ada96c53b8495fd5d4f40c62cc8ed0102f5ee9d3660fa71d03f52a06bb45865d7c44781d77f51fe782b2b5aac212e6681fbdf34d03155d7c5b9653dce008a9c1c6cbd435a5181b50950de17934c5280d85ef7a994d3cf9dd3052a2402f261853ec034a395d06336794e7aef64c159c4eea24a1d95ff75fa84e273d18737b9b10b44676af0f6a42aa3348c21a99966da2583cce50799f94484088d2780d4a5535c308ebcae87209b553285b9831fd000935425bb84fb7de666fb28931df079b5bdaabe7b444e9afb1dc872e9603c24c291771bf5f8f3bb7292bd24a3ed240a0caeca7a50fe2fc9bb25b391c3508687c5fc3c416ae5b8d793e3b631eeeeb2deb0ac684d0d0fdfd2611700d3da22f45283239dc3b5f4a1aa9993c89c37aedebeec6cb88b75a851b1d6500a73eefe34371e6ce4c528faf2cba1ba661c276d34b6b32b48c5cb3f1ddda23583d0890766713157fcdc4d0067f63d2adc674b543b8aaac13e2a92b77e0966f6c8f916a3ca7d86d906a6b12edd0f44c5980a5da68c26cf92fcbeb6d722ab9db1fd86e1224f55667ab5c4077e057a1b12a047737ddba8d3ddd3b3314efe6d36d20e9918b65956762e75bfc5346b02d9c9857138ab2dacdca56083f24db65c0bbd67126c6866f9bb858da31d47e48bcd9affe8e2dddf2a8f82d23b7608c7b216e56b25860b134a71a401c0f6a56542f1bb2cc41cc9012a6c5eabc41dd914defdc6d44370b5816376e583b188daca82f8aa10f2c651845dd3e5118e0a4be13d25b91445f08cb5878aa335d3a2e56c55aee2dbe6113237b6502f08c5da92e1eacbaa0e41cadca27a1e9069be52202b675aec987d21ffb662fc1bfeb207c1a655538c7ba29404413c9da0afdb50f3b1efe9a6597964dafc305", 0x1000}, {&(0x7f0000000700)="88e3080cb777fe0f", 0x8}, {&(0x7f00000017c0)="4e2a8bb72318ee83d0a7147273b54f1acdb71c327f92e690fba737be0b7eacfd06c8122c58d48050e9c303c0c22ac0b27ee9546532945a5a7918c283464d5fa04e29b7eef7e29f1c3a0e0fe3138a9a4221804fffcf89403fc1f3ef22721927c44b950035fb7431ff21c362f6282b65aa06696b222ce6f7dd600982440e6573c9911bdc08467491946fb35e8ef6751713f471111940ef5d765b590b11cfa63027656ef4b0117770df763cfe2ddb8231486c226452d96c1c2af178b62849f4697ca0da28c6063ab936a85de81dbfd207dbb531686dd66be22028c8e5bc062901652399699dfa4b6b97c4ff91c28b", 0xed}], 0x6, &(0x7f0000001d00)=[{0x58, 0x119, 0x401, "a387799021aad3a20497370fc2275ed8c185feb35881df1813d70acc5ef4ff527a032bb72ee336eaf7509865f4ce55fe32c0c165a8b2dcf5d6834b61e759309352"}, {0x1010, 0x224, 0x1ff, "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"}, {0x38, 0x10f, 0x7, "251c94312c3af2926f5ddeba8e77a15170e6f2d0797211c828fdb66297d56bc3d5251fa9d8"}, {0x68, 0x101, 0x7fff, "b41e6b0fa649d42340abbb07afe446c24e748d433d30a3dc31eac392d6a27d002358a043ef5caa450b472a9227a45db743912fb170f31be9ca6939b0faf5044adf7304fe1eb506eb4ea573b82352ef9c4e9e07fb7f8f"}, {0x78, 0x109, 0x3f, "8bc225363e50a643acd592e74203c16c68baa3c33e97ab692bd339028f3febd67db8efa41d4db162a6413f6bb445a243893c2498b3420ded72007da322d5ac314d6fb09878c949d13487d6b76777435896ea80bd767241ac7f0056758ed6d543ad"}, {0xa0, 0x117, 0xff, "33af2b0a8a250bea9cb0e28ecdd6e71ae25f061ef0f734f2d92023d18bb437cb8b264a195aa6fe6a035d85c064e408193f605c86194f950f215188276b021c8504b0750b9522783e2d8778c2871b0569117ac4fbf667e98dc45997748e6383714a206c887de096346e0017b397ca88cac833acf282f1e9281bc71c1328a8aadf154216ad6749bc947aba"}, {0xa0, 0x116, 0x4, "00fe11fe36da9285d8fd51a565a91af31103222b10d8a16290ab60884cc764315af5b14a2cac540e853107738e986a5a3427464e61acab0c0c25bece3d341aca4cdf84f7be45a19a6dbe5dabd6a51c2c0ec97f6105bf3725d58fcab8be69659f9e7df9d4e74bac97bb193d3013244569abba71a3a7b882c91226525ca5a3c91a362db379f9cae08b65"}, {0x48, 0x1, 0x7fff, "5ac8b67e3e058bef129f0bc10ca3ff6e5c9fbc6e156dbe3b991c73fe1344a6a23b3f1793aa79c21a7e2848d582286b42c7941310"}, {0x100, 0x10b, 0xfff, "a21425ec2fb4f4583cf0e6fa8fa8bf312463ae89028e5eefe8dd850ae1159c83bafc15bdfc84009334ad2654b11ee0d52576eeeaecf00f86505443c631a2ee2f209e255c7b7b52c9bd4a5ee36eae68375703338a340817cbddf716a14d109a1596e505087a355253019d6978e92d329c071f642f5e155a1ddb3c1649dc6b55d3085a03881e7e81ab3830de524508d007496c0cb7bdd1cd7a2ad2204362bc907f517780d0bea97d1ceaa2fe5950d7be54095fc4097dda97fee92c063fcee1f686e63de00808525ac2df268232ed287525058e508d36a67cce48a98a8c7e8216401bdba012e3a344947f46f5"}], 0x1408}, 0x8000) 23:07:49 executing program 5: r0 = socket$kcm(0xa, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:49 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x0, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000007a00000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) write$cgroup_type(r4, &(0x7f0000001a40)='threaded\x00', 0x9) sendmsg$kcm(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="765f6f0742022d15ec0c1022f66d7f94772331048c6e388aa15f6eb4bb7c986386625a6e41f0f08cc42d8789bcb200036d98f3d95679428dc7642d27967fb2111892c4a245f5bbabafefd64a000d3086862dcc1dfa277d797e0d4478fb63623c30e97331c79dcb49", 0x68}, {&(0x7f0000000480)="7d3421f2318eead3c75232d7b48fe043f43f6a9df95153432698bf06790306aee24caf353c385e21d4fa938d21a57e5489c02d84e8b57b3e51d63a99d3e7ec79dc9db37aab47afbf6516ec0607dc500fc4e5c2f1b9f97a4c5f8573a1df3a0ffe639df5b66d1d09183680d62e76d2f2013610098a8646d2cc63fabcd61a744dbb09448d9694d194ccbe96c189fc2a8a1f3c287456381103a1fec20c5d36af402c555dc1ec4500cb5b58fafc0df0c312f189cc35ef684f131ae699962d51bb6275caf07e840b21254f7efae66b3816da75c36c4d714fdf881adf401b10c72a4e6aed7ee794804f5a04920c730ffd2fc5f8eef486042dd05cdf", 0xf8}, {&(0x7f0000000580)="bdffeae8635b0637f5997ae9a9730bf7db0126c3483ebe40e14148c47ffc5d9eb12d31ada12be8306b028ad8bc4db93dbe3b4a18c5daf6e6dd90d658341001f07c9d64031c103b501f503b240014d3f5168560bfa1af2efcb6e59882d6eb3e2c12baf65c4cf644e4b889fd465eb262badf75e834e9e436e1f67eaa775d0e4729698d0b", 0x83}, {&(0x7f0000000640)="c74541abc43e356f5d6c23b4fa1ac25c5b5c815920171f91a6864184e8b595772991553a03b35843abf7ae46e5289c66aa35f6ed6f1a6755fd9541b34d1866e04af09047fc99d904fe", 0x49}, {&(0x7f0000000300)="b0f978c8597dfed92afe53bfb522a816c74d", 0x12}, {&(0x7f0000000700)="2c5db90eb266919874897ea527e0db", 0xf}], 0x6, &(0x7f0000000840)=[{0x20, 0x118, 0x2, "3fe8ee5c741b7b5102"}, {0x30, 0x117, 0x7, "d79f9a7bfbd558eb64fc849f2fad4d04f0bf434eda3c9dd6759f2c78925e"}, {0x1010, 0x29, 0x0, "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"}, {0x108, 0xff, 0x4, "0bbf62d7d13ee72d701d9dd92ab5fce893590d86469e3427632cf19595ba89748f94e0a3bdd957df7e231e7357b5ebd45afb9776a92f74c649aeb5a3d03222cac624c1c7f98d17a311423bce8fcbd1c9552b0f2f14fadb2ef47086ff2d3c98dbc69a1f898159b0b256cbee397c26a3e2bc7d956e362600949a8e77a2c8b2cabaa12e088908c7a7f27119197a77b7163c9d771edd186a9b21119fb1080b5f3f5ec31f8dfc709df341a2e8235e6fd747d6fa982cd8150bcd0a19c24795e366af8829be3cb8a47b1d615c8c346ef6765e08f0746614f32be55f34a1f4a660e4676460d3937299ead5866c02d2878cc2f1fcdd40"}, {0x58, 0x101, 0xa2f, "8c7ab0d2dce1b6e599d0219936b4a7789837565901d5cca51d8ddea29f46fb5af0542b7442628302eac570f7007f0954c740a1a28d3cb8f78c356f9999d59eae1c"}, {0x20, 0x103, 0x3, "58b30050460acd79d57a20"}], 0x11e0}, 0xc00) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:50 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x0, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 5: socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x16, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:50 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "f7ffff7f00000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 5: socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "ffffff8d00000000000000000000000005"}], 0x28}, 0x0) 23:07:50 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x0, 0x43, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa32000000000000703000000eeffff7a0af0fff8ffff930ba4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d00000019228a8cc49ce86adcd3b7000000000000000000da24fa3f1ba3564b8cf9faac1db7e5c793911ccebe4c6ef7d4a0f037ee0ce16717d98289b1083f4348ccef4c674ee8fd09ef5601894b4c4babb0bf6647c7952c88dfecc5723645c83e7aa21c684e0b9bfe12fed14b77d07a088b762b6231aa0eaeb3594b9469af04b2357ea7ec8242280d7c96f1221d643d145bdaa12f668e3300dac3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:51 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x17, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:51 executing program 5: socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x0, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) write$cgroup_type(r4, &(0x7f0000001a40)='threaded\x00', 0x9) sendmsg$kcm(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000400)="765f6f0742022d15ec0c1022f66d7f94772331048c6e388aa15f6eb4bb7c986386625a6e41f0f08cc42d8789bcb200036d98f3d95679428dc7642d27967fb2111892c4a245f5bbabafefd64a000d3086862dcc1dfa277d797e0d4478fb63623c30e97331c79dcb49", 0x68}, {&(0x7f0000000480)="7d3421f2318eead3c75232d7b48fe043f43f6a9df95153432698bf06790306aee24caf353c385e21d4fa938d21a57e5489c02d84e8b57b3e51d63a99d3e7ec79dc9db37aab47afbf6516ec0607dc500fc4e5c2f1b9f97a4c5f8573a1df3a0ffe639df5b66d1d09183680d62e76d2f2013610098a8646d2cc63fabcd61a744dbb09448d9694d194ccbe96c189fc2a8a1f3c287456381103a1fec20c5d36af402c555dc1ec4500cb5b58fafc0df0c312f189cc35ef684f131ae699962d51bb6275caf07e840b21254f7efae66b3816da75c36c4d714fdf881adf401b10c72a4e6aed7ee794804f5a04920c730ffd2fc5f8eef486042dd05cdf", 0xf8}, {&(0x7f0000000580)="bdffeae8635b0637f5997ae9a9730bf7db0126c3483ebe40e14148c47ffc5d9eb12d31ada12be8306b028ad8bc4db93dbe3b4a18c5daf6e6dd90d658341001f07c9d64031c103b501f503b240014d3f5168560bfa1af2efcb6e59882d6eb3e2c12baf65c4cf644e4b889fd465eb262badf75e834e9e436e1f67eaa775d0e4729698d0b", 0x83}, {&(0x7f0000000640)="c74541abc43e356f5d6c23b4fa1ac25c5b5c815920171f91a6864184e8b595772991553a03b35843abf7ae46e5289c66aa35f6ed6f1a6755fd9541b34d1866e04af09047fc99d904fe", 0x49}, {&(0x7f0000000300)="b0f978c8597dfed92afe53bfb522a816c74d", 0x12}, {&(0x7f0000000700)="2c5db90eb266919874897ea527e0db", 0xf}], 0x6, &(0x7f0000000840)=[{0x20, 0x118, 0x2, "3fe8ee5c741b7b5102"}, {0x30, 0x117, 0x7, "d79f9a7bfbd558eb64fc849f2fad4d04f0bf434eda3c9dd6759f2c78925e"}, {0x1010, 0x29, 0x0, "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"}, {0x108, 0xff, 0x4, "0bbf62d7d13ee72d701d9dd92ab5fce893590d86469e3427632cf19595ba89748f94e0a3bdd957df7e231e7357b5ebd45afb9776a92f74c649aeb5a3d03222cac624c1c7f98d17a311423bce8fcbd1c9552b0f2f14fadb2ef47086ff2d3c98dbc69a1f898159b0b256cbee397c26a3e2bc7d956e362600949a8e77a2c8b2cabaa12e088908c7a7f27119197a77b7163c9d771edd186a9b21119fb1080b5f3f5ec31f8dfc709df341a2e8235e6fd747d6fa982cd8150bcd0a19c24795e366af8829be3cb8a47b1d615c8c346ef6765e08f0746614f32be55f34a1f4a660e4676460d3937299ead5866c02d2878cc2f1fcdd40"}, {0x58, 0x101, 0xa2f, "8c7ab0d2dce1b6e599d0219936b4a7789837565901d5cca51d8ddea29f46fb5af0542b7442628302eac570f7007f0954c740a1a28d3cb8f78c356f9999d59eae1c"}, {0x20, 0x103, 0x3, "58b30050460acd79d57a20"}], 0x11e0}, 0xc00) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu///z1\x8c', 0x1ff) 23:07:51 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "004000a000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x0, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 23:07:51 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x18, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f0000000400)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000480)="c81f6329be861726b650db496278e3d5f1609dddbe207b56d3b3b06596473730c580708db0d8bf7cdb1c4a2c9c0a26af0516d0753468a3cc569fc72991fc7873d6d86d444bc31511580f3dc35b9d8f882b9fc05a08e3cf25fd3d38af6c40924593b9de5933957d6c5f6e8a10c3d1ac91dea07e86836c96cd0fb48df1eb821c813954c8dca5731131e88eb9d2e33f032ffec292e102bd4c956ba5443b1de58793c62e1e41", 0xa4}], 0x1, &(0x7f00000040c0)=ANY=[@ANYBLOB="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"], 0x2388}, 0x240ca101) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) write$cgroup_int(r3, &(0x7f00000005c0)=0x4f7b, 0x12) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:51 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x0, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 23:07:51 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00a000a000000000000000000000000005"}], 0x28}, 0x0) 23:07:51 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:51 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 23:07:52 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000005aa00000000000000000000000005"}], 0x28}, 0x0) 23:07:52 executing program 4 (fault-call:0 fault-nth:0): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:52 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:52 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x2], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:52 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:52 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000bb800000000000000000000000005"}], 0x28}, 0x0) 23:07:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) mkdirat$cgroup(r1, &(0x7f0000000300)='syz0\x00', 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000400)=r0) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:52 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:52 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:52 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "fffffdef00000000000000000000000005"}], 0x28}, 0x0) [ 2270.298117][ T8212] FAULT_INJECTION: forcing a failure. [ 2270.298117][ T8212] name failslab, interval 1, probability 0, space 0, times 0 [ 2270.359952][ T8212] CPU: 1 PID: 8212 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2270.368604][ T8212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2270.378671][ T8212] Call Trace: [ 2270.381992][ T8212] dump_stack+0x197/0x210 [ 2270.386354][ T8212] should_fail.cold+0xa/0x15 [ 2270.390972][ T8212] ? fault_create_debugfs_attr+0x180/0x180 [ 2270.396813][ T8212] ? ___might_sleep+0x163/0x2c0 [ 2270.401963][ T8212] __should_failslab+0x121/0x190 [ 2270.407013][ T8212] should_failslab+0x9/0x14 [ 2270.411550][ T8212] kmem_cache_alloc_node_trace+0x274/0x750 [ 2270.417563][ T8212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2270.423830][ T8212] ? cap_capable+0x205/0x270 [ 2270.428637][ T8212] __kmalloc_node+0x3d/0x70 [ 2270.433167][ T8212] __bpf_map_area_alloc+0xbd/0xf0 [ 2270.438243][ T8212] bpf_map_area_alloc+0x20/0x30 [ 2270.443121][ T8212] array_map_alloc+0x4bc/0x7d0 [ 2270.447912][ T8212] ? array_of_map_free+0x50/0x50 [ 2270.453298][ T8212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:07:52 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) [ 2270.459564][ T8212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2270.465837][ T8212] ? array_of_map_free+0x50/0x50 [ 2270.470813][ T8212] __do_sys_bpf+0x478/0x3610 [ 2270.475531][ T8212] ? bpf_prog_load+0x1960/0x1960 [ 2270.480486][ T8212] ? __kasan_check_write+0x14/0x20 [ 2270.485618][ T8212] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2270.491189][ T8212] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2270.496501][ T8212] ? wait_for_completion+0x440/0x440 [ 2270.501903][ T8212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 23:07:52 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2270.509054][ T8212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2270.514562][ T8212] ? do_syscall_64+0x26/0x790 [ 2270.519264][ T8212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2270.525371][ T8212] ? do_syscall_64+0x26/0x790 [ 2270.530076][ T8212] __x64_sys_bpf+0x73/0xb0 [ 2270.534517][ T8212] do_syscall_64+0xfa/0x790 [ 2270.534540][ T8212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2270.534551][ T8212] RIP: 0033:0x45a919 [ 2270.534574][ T8212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2270.569262][ T8212] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2270.569278][ T8212] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2270.569286][ T8212] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2270.569294][ T8212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:07:53 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "fffffff500000000000000000000000005"}], 0x28}, 0x0) [ 2270.569302][ T8212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2270.569310][ T8212] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:53 executing program 4 (fault-call:0 fault-nth:1): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:53 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x3], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:53 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "7ffffff700000000000000000000000005"}], 0x28}, 0x0) 23:07:53 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x2, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:53 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) [ 2270.845089][ T8233] FAULT_INJECTION: forcing a failure. [ 2270.845089][ T8233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2270.916398][ T8233] CPU: 1 PID: 8233 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2270.926352][ T8233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2270.936462][ T8233] Call Trace: [ 2270.939781][ T8233] dump_stack+0x197/0x210 [ 2270.944236][ T8233] should_fail.cold+0xa/0x15 [ 2270.948856][ T8233] ? fault_create_debugfs_attr+0x180/0x180 [ 2270.954689][ T8233] ? ___might_sleep+0x163/0x2c0 [ 2270.960029][ T8233] should_fail_alloc_page+0x50/0x60 [ 2270.965732][ T8233] __alloc_pages_nodemask+0x1a1/0x910 [ 2270.971260][ T8233] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2270.977812][ T8233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2270.984423][ T8233] ? find_next_bit+0x107/0x130 [ 2270.989308][ T8233] pcpu_populate_chunk+0xf8/0x940 [ 2270.994364][ T8233] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2271.000111][ T8233] ? find_next_bit+0xc7/0x130 [ 2271.004840][ T8233] pcpu_alloc+0xd5b/0x1380 [ 2271.009387][ T8233] ? pcpu_alloc_area+0x820/0x820 [ 2271.014370][ T8233] ? kasan_kmalloc+0x9/0x10 [ 2271.018996][ T8233] ? __kmalloc_node+0x4e/0x70 [ 2271.023743][ T8233] __alloc_percpu_gfp+0x28/0x30 [ 2271.028716][ T8233] array_map_alloc+0x698/0x7d0 [ 2271.033865][ T8233] ? array_of_map_free+0x50/0x50 [ 2271.039402][ T8233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2271.046843][ T8233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2271.054059][ T8233] ? array_of_map_free+0x50/0x50 [ 2271.054141][ T8233] __do_sys_bpf+0x478/0x3610 [ 2271.063781][ T8233] ? bpf_prog_load+0x1960/0x1960 [ 2271.069425][ T8233] ? __kasan_check_write+0x14/0x20 [ 2271.074809][ T8233] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2271.074824][ T8233] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2271.074839][ T8233] ? wait_for_completion+0x440/0x440 [ 2271.074861][ T8233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2271.074890][ T8233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2271.074904][ T8233] ? do_syscall_64+0x26/0x790 [ 2271.074925][ T8233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2271.086182][ T8233] ? do_syscall_64+0x26/0x790 [ 2271.098331][ T8233] __x64_sys_bpf+0x73/0xb0 [ 2271.098352][ T8233] do_syscall_64+0xfa/0x790 [ 2271.098374][ T8233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2271.098384][ T8233] RIP: 0033:0x45a919 [ 2271.098400][ T8233] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2271.098415][ T8233] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2271.137764][ T8233] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2271.164935][ T8233] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2271.164944][ T8233] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2271.164952][ T8233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2271.164959][ T8233] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:53 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:53 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000fc00000000000000000000000005"}], 0x28}, 0x0) 23:07:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r2, r1, 0x0, 0xa, &(0x7f0000000400)='syzkaller\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r5, r3, 0x0, 0x12, &(0x7f0000000300)='./cgroup.cpu//.z1\x8c', r6}, 0x30) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:53 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x4], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:53 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x10, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:53 executing program 4 (fault-call:0 fault-nth:2): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:53 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) [ 2271.448723][ T8255] FAULT_INJECTION: forcing a failure. [ 2271.448723][ T8255] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:07:53 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000080fe00000000000000000000000005"}], 0x28}, 0x0) [ 2271.551201][ T8255] CPU: 1 PID: 8255 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2271.560096][ T8255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2271.570794][ T8255] Call Trace: [ 2271.574212][ T8255] dump_stack+0x197/0x210 [ 2271.579269][ T8255] should_fail.cold+0xa/0x15 [ 2271.583900][ T8255] ? fault_create_debugfs_attr+0x180/0x180 [ 2271.589735][ T8255] ? ___might_sleep+0x163/0x2c0 [ 2271.594622][ T8255] should_fail_alloc_page+0x50/0x60 [ 2271.599847][ T8255] __alloc_pages_nodemask+0x1a1/0x910 [ 2271.605254][ T8255] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2271.611009][ T8255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2271.617275][ T8255] ? find_next_bit+0x107/0x130 [ 2271.622076][ T8255] pcpu_populate_chunk+0xf8/0x940 [ 2271.627127][ T8255] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2271.632887][ T8255] ? find_next_bit+0xc7/0x130 [ 2271.637598][ T8255] pcpu_alloc+0xd5b/0x1380 [ 2271.642131][ T8255] ? pcpu_alloc_area+0x820/0x820 [ 2271.647473][ T8255] ? kasan_kmalloc+0x9/0x10 [ 2271.651994][ T8255] ? __kmalloc_node+0x4e/0x70 [ 2271.656699][ T8255] __alloc_percpu_gfp+0x28/0x30 [ 2271.661596][ T8255] array_map_alloc+0x698/0x7d0 [ 2271.667878][ T8255] ? array_of_map_free+0x50/0x50 [ 2271.673131][ T8255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2271.679504][ T8255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2271.685753][ T8255] ? array_of_map_free+0x50/0x50 [ 2271.685771][ T8255] __do_sys_bpf+0x478/0x3610 [ 2271.685791][ T8255] ? bpf_prog_load+0x1960/0x1960 [ 2271.685805][ T8255] ? __kasan_check_write+0x14/0x20 [ 2271.685820][ T8255] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2271.685841][ T8255] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2271.716755][ T8255] ? wait_for_completion+0x440/0x440 [ 2271.722078][ T8255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2271.728366][ T8255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2271.734040][ T8255] ? do_syscall_64+0x26/0x790 [ 2271.738744][ T8255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2271.744923][ T8255] ? do_syscall_64+0x26/0x790 [ 2271.749622][ T8255] __x64_sys_bpf+0x73/0xb0 [ 2271.754549][ T8255] do_syscall_64+0xfa/0x790 [ 2271.759084][ T8255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2271.765099][ T8255] RIP: 0033:0x45a919 [ 2271.765116][ T8255] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2271.765123][ T8255] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 23:07:54 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x25, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:54 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000c0fe00000000000000000000000005"}], 0x28}, 0x0) 23:07:54 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x5], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:54 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x0) 23:07:54 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x0) [ 2271.765138][ T8255] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2271.765146][ T8255] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2271.765153][ T8255] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2271.765166][ T8255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2271.765174][ T8255] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:54 executing program 4 (fault-call:0 fault-nth:3): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r0, &(0x7f0000001cc0), 0x12) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r0, &(0x7f0000000300)="c80605125e", &(0x7f00000007c0)=""/4096, 0x8}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b70665040400050000000404000001007d60bf030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000440)={r2, r3}) recvmsg(0xffffffffffffffff, &(0x7f0000002040)={&(0x7f0000001e00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e80)=""/91, 0x5b}], 0x1, &(0x7f0000001f40)=""/197, 0xc5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000002080)={0xc12be59891288912, 0x6, 0x20200000, 0x8000, 0x408, r3, 0x7, [], r4, r3, 0x1, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r5, 0xc, r6, 0x8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000480)={0x7fffffff, 0xff}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:54 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0}, 0x0) 23:07:54 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000ff00000000000000000000000005"}], 0x28}, 0x0) 23:07:54 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x6], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:54 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x4e22, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:54 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 23:07:54 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "effdffff00000000000000000000000005"}], 0x28}, 0x0) [ 2272.214049][ T8292] FAULT_INJECTION: forcing a failure. [ 2272.214049][ T8292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2272.273384][ T8292] CPU: 0 PID: 8292 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2272.282204][ T8292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2272.292264][ T8292] Call Trace: [ 2272.295574][ T8292] dump_stack+0x197/0x210 [ 2272.299952][ T8292] should_fail.cold+0xa/0x15 [ 2272.304661][ T8292] ? fault_create_debugfs_attr+0x180/0x180 [ 2272.310491][ T8292] ? ___might_sleep+0x163/0x2c0 [ 2272.315397][ T8292] should_fail_alloc_page+0x50/0x60 [ 2272.320616][ T8292] __alloc_pages_nodemask+0x1a1/0x910 [ 2272.326013][ T8292] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2272.331764][ T8292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2272.338035][ T8292] ? find_next_bit+0x107/0x130 [ 2272.342849][ T8292] pcpu_populate_chunk+0xf8/0x940 [ 2272.348503][ T8292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2272.354251][ T8292] ? find_next_bit+0xc7/0x130 [ 2272.358980][ T8292] pcpu_alloc+0xd5b/0x1380 [ 2272.363429][ T8292] ? pcpu_alloc_area+0x820/0x820 [ 2272.368415][ T8292] __alloc_percpu_gfp+0x28/0x30 [ 2272.373376][ T8292] array_map_alloc+0x698/0x7d0 [ 2272.378426][ T8292] ? array_of_map_free+0x50/0x50 [ 2272.383475][ T8292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2272.389740][ T8292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2272.396020][ T8292] ? array_of_map_free+0x50/0x50 [ 2272.401012][ T8292] __do_sys_bpf+0x478/0x3610 [ 2272.405635][ T8292] ? bpf_prog_load+0x1960/0x1960 [ 2272.410698][ T8292] ? __kasan_check_write+0x14/0x20 [ 2272.415907][ T8292] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2272.421644][ T8292] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2272.426945][ T8292] ? wait_for_completion+0x440/0x440 [ 2272.432264][ T8292] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2272.438542][ T8292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2272.444630][ T8292] ? do_syscall_64+0x26/0x790 [ 2272.449320][ T8292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.455404][ T8292] ? do_syscall_64+0x26/0x790 [ 2272.460113][ T8292] __x64_sys_bpf+0x73/0xb0 [ 2272.464548][ T8292] do_syscall_64+0xfa/0x790 [ 2272.469071][ T8292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2272.475058][ T8292] RIP: 0033:0x45a919 [ 2272.478968][ T8292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2272.498669][ T8292] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2272.507192][ T8292] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2272.515183][ T8292] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:07:54 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0xa, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2272.523181][ T8292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2272.531166][ T8292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2272.539156][ T8292] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:55 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "8dffffff00000000000000000000000005"}], 0x28}, 0x0) 23:07:55 executing program 4 (fault-call:0 fault-nth:4): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000baf05de1bdeacee0dc6ad9afbfa3fba1000000000703000000eeffff7a0af08d404677fff8ffffff79a4f0ff00000000b7060000ffffffff2d6005000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) write$cgroup_pid(r3, &(0x7f0000001cc0)=r2, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='\x00', r1}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0x2, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000440)=0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r6, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={0x0, r7, 0x2b}, 0x10) 23:07:55 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x63, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:55 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x7], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2272.767429][ T8316] FAULT_INJECTION: forcing a failure. [ 2272.767429][ T8316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:07:55 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) [ 2272.858748][ T8316] CPU: 0 PID: 8316 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2272.867469][ T8316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2272.877606][ T8316] Call Trace: [ 2272.880948][ T8316] dump_stack+0x197/0x210 [ 2272.885316][ T8316] should_fail.cold+0xa/0x15 [ 2272.889942][ T8316] ? fault_create_debugfs_attr+0x180/0x180 [ 2272.895773][ T8316] ? ___might_sleep+0x163/0x2c0 [ 2272.900657][ T8316] should_fail_alloc_page+0x50/0x60 [ 2272.905879][ T8316] __alloc_pages_nodemask+0x1a1/0x910 [ 2272.905898][ T8316] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2272.905921][ T8316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2272.905935][ T8316] ? find_next_bit+0x107/0x130 [ 2272.905963][ T8316] pcpu_populate_chunk+0xf8/0x940 [ 2272.928128][ T8316] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2272.928150][ T8316] ? find_next_bit+0xc7/0x130 [ 2272.928174][ T8316] pcpu_alloc+0xd5b/0x1380 [ 2272.949980][ T8316] ? pcpu_alloc_area+0x820/0x820 23:07:55 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "f5ffffff00000000000000000000000005"}], 0x28}, 0x0) [ 2272.954994][ T8316] __alloc_percpu_gfp+0x28/0x30 [ 2272.959868][ T8316] array_map_alloc+0x698/0x7d0 [ 2272.964662][ T8316] ? array_of_map_free+0x50/0x50 [ 2272.969651][ T8316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2272.976085][ T8316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2272.982349][ T8316] ? array_of_map_free+0x50/0x50 [ 2272.987317][ T8316] __do_sys_bpf+0x478/0x3610 [ 2272.991952][ T8316] ? bpf_prog_load+0x1960/0x1960 [ 2272.996908][ T8316] ? __kasan_check_write+0x14/0x20 [ 2273.002021][ T8316] ? __mutex_unlock_slowpath+0xf0/0x6a0 23:07:55 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000400000000000000000005"}], 0x28}, 0x0) [ 2273.007607][ T8316] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2273.012935][ T8316] ? wait_for_completion+0x440/0x440 [ 2273.018250][ T8316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2273.024615][ T8316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2273.030114][ T8316] ? do_syscall_64+0x26/0x790 [ 2273.034822][ T8316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.040989][ T8316] ? do_syscall_64+0x26/0x790 [ 2273.045788][ T8316] __x64_sys_bpf+0x73/0xb0 [ 2273.045806][ T8316] do_syscall_64+0xfa/0x790 23:07:55 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2273.045827][ T8316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2273.045838][ T8316] RIP: 0033:0x45a919 [ 2273.045855][ T8316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2273.045863][ T8316] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2273.045875][ T8316] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2273.045889][ T8316] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2273.092849][ T8316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2273.092858][ T8316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2273.092867][ T8316] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:55 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x2, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:55 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000001000000000000000000005"}], 0x28}, 0x0) 23:07:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x20007, 0x200}, 0x109c4, 0x8f4, 0x0, 0x7, 0x4, 0x2000009, 0x3}, r3, 0xd, r4, 0x8) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r5, r6, 0x1, 0x2}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r4, 0x10, &(0x7f0000000600)={&(0x7f0000000500)=""/205, 0xcd, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1c, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x976d5f7b333887e7, 0x1, 0x3, 0x10, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffc}]}, &(0x7f00000002c0)='GPL\x00', 0x92a7, 0x1b, &(0x7f0000000300)=""/27, 0x41000, 0x4, [], r5, 0xc, r7, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x9, 0xc}, 0x10, r8}, 0x78) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:55 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x8], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:55 executing program 4 (fault-call:0 fault-nth:5): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:55 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x3, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:55 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)}, 0x0) 23:07:55 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "ffffffffa0004000000000000000000005"}], 0x28}, 0x0) 23:07:56 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x9], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:56 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x0, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:56 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:56 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000034000000000000000000005"}], 0x28}, 0x0) [ 2273.714419][ T8361] FAULT_INJECTION: forcing a failure. [ 2273.714419][ T8361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2273.894402][ T8361] CPU: 0 PID: 8361 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2273.903749][ T8361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2273.913815][ T8361] Call Trace: [ 2273.917133][ T8361] dump_stack+0x197/0x210 [ 2273.921492][ T8361] should_fail.cold+0xa/0x15 [ 2273.926115][ T8361] ? fault_create_debugfs_attr+0x180/0x180 [ 2273.931946][ T8361] ? ___might_sleep+0x163/0x2c0 [ 2273.936862][ T8361] should_fail_alloc_page+0x50/0x60 [ 2273.942317][ T8361] __alloc_pages_nodemask+0x1a1/0x910 [ 2273.947821][ T8361] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2273.954599][ T8361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2273.961700][ T8361] ? find_next_bit+0x107/0x130 [ 2273.967981][ T8361] pcpu_populate_chunk+0xf8/0x940 [ 2273.973047][ T8361] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2273.978788][ T8361] ? find_next_bit+0xc7/0x130 [ 2273.983497][ T8361] pcpu_alloc+0xd5b/0x1380 [ 2273.987943][ T8361] ? pcpu_alloc_area+0x820/0x820 [ 2273.992914][ T8361] __alloc_percpu_gfp+0x28/0x30 [ 2273.997874][ T8361] array_map_alloc+0x698/0x7d0 [ 2274.002685][ T8361] ? array_of_map_free+0x50/0x50 [ 2274.007646][ T8361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2274.014466][ T8361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2274.021304][ T8361] ? array_of_map_free+0x50/0x50 [ 2274.026282][ T8361] __do_sys_bpf+0x478/0x3610 [ 2274.030938][ T8361] ? bpf_prog_load+0x1960/0x1960 [ 2274.035900][ T8361] ? __kasan_check_write+0x14/0x20 [ 2274.041035][ T8361] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2274.046597][ T8361] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2274.051903][ T8361] ? wait_for_completion+0x440/0x440 [ 2274.057227][ T8361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2274.063956][ T8361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2274.070252][ T8361] ? do_syscall_64+0x26/0x790 [ 2274.075147][ T8361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.081237][ T8361] ? do_syscall_64+0x26/0x790 [ 2274.085942][ T8361] __x64_sys_bpf+0x73/0xb0 [ 2274.090381][ T8361] do_syscall_64+0xfa/0x790 [ 2274.094914][ T8361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.100909][ T8361] RIP: 0033:0x45a919 [ 2274.105076][ T8361] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2274.125405][ T8361] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2274.133837][ T8361] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:07:56 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x5, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2274.141949][ T8361] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2274.149946][ T8361] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2274.158459][ T8361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2274.167094][ T8361] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:56 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "ffffffffa000a000000000000000000005"}], 0x28}, 0x0) 23:07:56 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:56 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0xa], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:56 executing program 4 (fault-call:0 fault-nth:6): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:56 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x0, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x10, &(0x7f0000000680)={&(0x7f0000000600)=""/75, 0x4b, 0xffffffffffffffff}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x1, 0x40, 0x6, 0x6, 0x0, 0xff, 0x80, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x5e, 0xcedb}, 0x400, 0x7, 0x81, 0x7, 0x18, 0x6, 0x320}, r2, 0xf, 0xffffffffffffffff, 0x8) r4 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x94, 0xfe, 0x5, 0x0, 0x0, 0x90b, 0x9000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000300), 0x2}, 0x20, 0xb1, 0x80000001, 0x1, 0xffffffff, 0x800, 0x8}, r1, 0x0, r3, 0xb) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0xb0, 0xf7, 0x1f, 0xb1, 0x0, 0x6, 0x10010, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xc31}, 0x80, 0xdfd8, 0xfffffbff, 0x0, 0xcc, 0xe4, 0x3}, r1, 0x7fff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) r7 = gettid() r8 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000880), 0x1}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x1ff, 0x0, 0x100}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = gettid() r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r9, r10, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={r7, r4, 0x0, 0x12, &(0x7f0000000740)='./cgroup.net/syz1\x00', r11}, 0x30) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r13) ioctl$sock_kcm_SIOCKCMUNATTACH(r13, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r13, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f00000007c0)={0x2, 0x70, 0xfc, 0xff, 0x7, 0x20, 0x0, 0x401, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfff80000, 0x4, @perf_config_ext={0x2, 0xffffffff9583f2bd}, 0x80, 0x1b, 0xaf, 0x2, 0xa0e, 0x4, 0x9}, r12, 0x10, r13, 0x2) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r5, 0xc, r6, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:56 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000001000000000000000005"}], 0x28}, 0x0) [ 2274.509607][ T8386] FAULT_INJECTION: forcing a failure. [ 2274.509607][ T8386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:07:57 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2274.623995][ T8386] CPU: 1 PID: 8386 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2274.632760][ T8386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2274.644225][ T8386] Call Trace: [ 2274.647563][ T8386] dump_stack+0x197/0x210 [ 2274.651990][ T8386] should_fail.cold+0xa/0x15 [ 2274.656679][ T8386] ? fault_create_debugfs_attr+0x180/0x180 [ 2274.662772][ T8386] ? ___might_sleep+0x163/0x2c0 [ 2274.667656][ T8386] should_fail_alloc_page+0x50/0x60 [ 2274.673059][ T8386] __alloc_pages_nodemask+0x1a1/0x910 [ 2274.680049][ T8386] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2274.685810][ T8386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2274.692165][ T8386] ? find_next_bit+0x107/0x130 [ 2274.697392][ T8386] pcpu_populate_chunk+0xf8/0x940 [ 2274.702462][ T8386] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2274.708229][ T8386] ? find_next_bit+0xc7/0x130 [ 2274.712940][ T8386] pcpu_alloc+0xd5b/0x1380 [ 2274.717679][ T8386] ? pcpu_alloc_area+0x820/0x820 23:07:57 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000002000000000000000005"}], 0x28}, 0x0) 23:07:57 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000003000000000000000005"}], 0x28}, 0x0) 23:07:57 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000004000000000000000005"}], 0x28}, 0x0) [ 2274.722655][ T8386] __alloc_percpu_gfp+0x28/0x30 [ 2274.727881][ T8386] array_map_alloc+0x698/0x7d0 [ 2274.732681][ T8386] ? array_of_map_free+0x50/0x50 [ 2274.737649][ T8386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2274.743929][ T8386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2274.750199][ T8386] ? array_of_map_free+0x50/0x50 [ 2274.755173][ T8386] __do_sys_bpf+0x478/0x3610 [ 2274.760311][ T8386] ? bpf_prog_load+0x1960/0x1960 [ 2274.765639][ T8386] ? __kasan_check_write+0x14/0x20 [ 2274.770863][ T8386] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2274.776447][ T8386] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2274.781767][ T8386] ? wait_for_completion+0x440/0x440 [ 2274.787191][ T8386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2274.793484][ T8386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2274.798983][ T8386] ? do_syscall_64+0x26/0x790 [ 2274.803751][ T8386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.809880][ T8386] ? do_syscall_64+0x26/0x790 [ 2274.814595][ T8386] __x64_sys_bpf+0x73/0xb0 [ 2274.819041][ T8386] do_syscall_64+0xfa/0x790 23:07:57 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x8, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2274.823838][ T8386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2274.830287][ T8386] RIP: 0033:0x45a919 [ 2274.835185][ T8386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2274.855328][ T8386] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2274.866531][ T8386] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2274.866540][ T8386] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2274.866547][ T8386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2274.866555][ T8386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2274.866563][ T8386] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:57 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000005000000000000000005"}], 0x28}, 0x0) 23:07:57 executing program 4 (fault-call:0 fault-nth:7): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2275.066908][ T8414] FAULT_INJECTION: forcing a failure. [ 2275.066908][ T8414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2275.115196][ T8414] CPU: 1 PID: 8414 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2275.124612][ T8414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2275.134954][ T8414] Call Trace: [ 2275.138724][ T8414] dump_stack+0x197/0x210 [ 2275.143257][ T8414] should_fail.cold+0xa/0x15 [ 2275.148341][ T8414] ? fault_create_debugfs_attr+0x180/0x180 [ 2275.154364][ T8414] ? ___might_sleep+0x163/0x2c0 [ 2275.159842][ T8414] should_fail_alloc_page+0x50/0x60 [ 2275.159858][ T8414] __alloc_pages_nodemask+0x1a1/0x910 [ 2275.159874][ T8414] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2275.159892][ T8414] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2275.159917][ T8414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2275.159940][ T8414] alloc_pages_current+0x107/0x210 [ 2275.198160][ T8414] ? ___might_sleep+0x163/0x2c0 [ 2275.203300][ T8414] __vmalloc_node_range+0x4f8/0x810 [ 2275.209346][ T8414] __vmalloc+0x44/0x50 [ 2275.213449][ T8414] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2275.213467][ T8414] pcpu_mem_zalloc+0x8a/0xf0 [ 2275.213485][ T8414] pcpu_create_chunk+0xe0/0x7f0 [ 2275.213505][ T8414] pcpu_alloc+0x10f3/0x1380 [ 2275.213532][ T8414] ? pcpu_alloc_area+0x820/0x820 [ 2275.213559][ T8414] __alloc_percpu_gfp+0x28/0x30 [ 2275.243766][ T8414] array_map_alloc+0x698/0x7d0 [ 2275.248917][ T8414] ? array_of_map_free+0x50/0x50 [ 2275.254000][ T8414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2275.260660][ T8414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2275.267019][ T8414] ? array_of_map_free+0x50/0x50 [ 2275.272146][ T8414] __do_sys_bpf+0x478/0x3610 [ 2275.276854][ T8414] ? bpf_prog_load+0x1960/0x1960 [ 2275.282090][ T8414] ? __kasan_check_write+0x14/0x20 [ 2275.288695][ T8414] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2275.294711][ T8414] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2275.300250][ T8414] ? wait_for_completion+0x440/0x440 [ 2275.307665][ T8414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 23:07:57 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0xb], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:57 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x0, 0x8, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:57 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x48, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2275.314383][ T8414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2275.320855][ T8414] ? do_syscall_64+0x26/0x790 [ 2275.325877][ T8414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.332059][ T8414] ? do_syscall_64+0x26/0x790 [ 2275.336779][ T8414] __x64_sys_bpf+0x73/0xb0 [ 2275.341430][ T8414] do_syscall_64+0xfa/0x790 [ 2275.347285][ T8414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.353276][ T8414] RIP: 0033:0x45a919 [ 2275.357381][ T8414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2275.379645][ T8414] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2275.388179][ T8414] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2275.396332][ T8414] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2275.404379][ T8414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2275.412874][ T8414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2275.421200][ T8414] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:58 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000006000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x0, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 4 (fault-call:0 fault-nth:8): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:58 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4c, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2275.669714][ T8434] FAULT_INJECTION: forcing a failure. [ 2275.669714][ T8434] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2275.739512][ T8434] CPU: 0 PID: 8434 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2275.748843][ T8434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2275.759869][ T8434] Call Trace: [ 2275.763189][ T8434] dump_stack+0x197/0x210 [ 2275.767632][ T8434] should_fail.cold+0xa/0x15 [ 2275.773552][ T8434] ? fault_create_debugfs_attr+0x180/0x180 [ 2275.779383][ T8434] ? ___might_sleep+0x163/0x2c0 [ 2275.784276][ T8434] should_fail_alloc_page+0x50/0x60 [ 2275.789508][ T8434] __alloc_pages_nodemask+0x1a1/0x910 [ 2275.795253][ T8434] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2275.795271][ T8434] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2275.795298][ T8434] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2275.795323][ T8434] alloc_pages_current+0x107/0x210 [ 2275.812899][ T8434] ? ___might_sleep+0x163/0x2c0 [ 2275.812921][ T8434] __vmalloc_node_range+0x4f8/0x810 [ 2275.812946][ T8434] __vmalloc+0x44/0x50 [ 2275.812962][ T8434] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2275.812977][ T8434] pcpu_mem_zalloc+0x8a/0xf0 [ 2275.812998][ T8434] pcpu_create_chunk+0xe0/0x7f0 [ 2275.833021][ T8434] pcpu_alloc+0x10f3/0x1380 [ 2275.833046][ T8434] ? pcpu_alloc_area+0x820/0x820 [ 2275.833070][ T8434] __alloc_percpu_gfp+0x28/0x30 [ 2275.833091][ T8434] array_map_alloc+0x698/0x7d0 [ 2275.843435][ T8434] ? array_of_map_free+0x50/0x50 [ 2275.843456][ T8434] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2275.843469][ T8434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2275.843484][ T8434] ? array_of_map_free+0x50/0x50 [ 2275.843501][ T8434] __do_sys_bpf+0x478/0x3610 [ 2275.843521][ T8434] ? bpf_prog_load+0x1960/0x1960 [ 2275.896982][ T8434] ? __kasan_check_write+0x14/0x20 [ 2275.897000][ T8434] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2275.897021][ T8434] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2275.914723][ T8434] ? wait_for_completion+0x440/0x440 [ 2275.914749][ T8434] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2275.914778][ T8434] ? trace_hardirqs_on_thunk+0x1a/0x1c 23:07:58 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000007000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x0, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x68, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2275.914799][ T8434] ? do_syscall_64+0x26/0x790 [ 2275.942453][ T8434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.948695][ T8434] ? do_syscall_64+0x26/0x790 [ 2275.953490][ T8434] __x64_sys_bpf+0x73/0xb0 [ 2275.957934][ T8434] do_syscall_64+0xfa/0x790 [ 2275.962491][ T8434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2275.968848][ T8434] RIP: 0033:0x45a919 [ 2275.972844][ T8434] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2275.992852][ T8434] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2276.002761][ T8434] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2276.011007][ T8434] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2276.019114][ T8434] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2276.028022][ T8434] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 23:07:58 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0xc], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2276.036562][ T8434] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:58 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x0, "0000000000000000000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6c, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:58 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000008000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000400)=r2, 0x4) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:58 executing program 4 (fault-call:0 fault-nth:9): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:58 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0xd], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:58 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000009000000000000000005"}], 0x28}, 0x0) 23:07:58 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x74, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:58 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2276.491683][ T8472] FAULT_INJECTION: forcing a failure. [ 2276.491683][ T8472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2276.573012][ T8472] CPU: 1 PID: 8472 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2276.581652][ T8472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2276.592180][ T8472] Call Trace: [ 2276.595503][ T8472] dump_stack+0x197/0x210 [ 2276.599927][ T8472] should_fail.cold+0xa/0x15 [ 2276.604607][ T8472] ? fault_create_debugfs_attr+0x180/0x180 [ 2276.610538][ T8472] ? ___might_sleep+0x163/0x2c0 [ 2276.615446][ T8472] should_fail_alloc_page+0x50/0x60 [ 2276.620672][ T8472] __alloc_pages_nodemask+0x1a1/0x910 [ 2276.626170][ T8472] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2276.631744][ T8472] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2276.638023][ T8472] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2276.644408][ T8472] alloc_pages_current+0x107/0x210 [ 2276.649987][ T8472] ? ___might_sleep+0x163/0x2c0 [ 2276.654897][ T8472] __vmalloc_node_range+0x4f8/0x810 [ 2276.660140][ T8472] __vmalloc+0x44/0x50 [ 2276.664232][ T8472] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2276.669024][ T8472] pcpu_mem_zalloc+0x8a/0xf0 [ 2276.673636][ T8472] pcpu_create_chunk+0xe0/0x7f0 [ 2276.678691][ T8472] pcpu_alloc+0x10f3/0x1380 [ 2276.683318][ T8472] ? pcpu_alloc_area+0x820/0x820 [ 2276.688293][ T8472] __alloc_percpu_gfp+0x28/0x30 [ 2276.693177][ T8472] array_map_alloc+0x698/0x7d0 [ 2276.697970][ T8472] ? array_of_map_free+0x50/0x50 [ 2276.703135][ T8472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2276.709422][ T8472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2276.715707][ T8472] ? array_of_map_free+0x50/0x50 [ 2276.720669][ T8472] __do_sys_bpf+0x478/0x3610 [ 2276.725492][ T8472] ? bpf_prog_load+0x1960/0x1960 [ 2276.730565][ T8472] ? __kasan_check_write+0x14/0x20 [ 2276.735720][ T8472] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2276.741407][ T8472] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2276.746718][ T8472] ? wait_for_completion+0x440/0x440 [ 2276.752046][ T8472] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2276.758450][ T8472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2276.763950][ T8472] ? do_syscall_64+0x26/0x790 [ 2276.768971][ T8472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2276.775330][ T8472] ? do_syscall_64+0x26/0x790 [ 2276.780146][ T8472] __x64_sys_bpf+0x73/0xb0 [ 2276.784758][ T8472] do_syscall_64+0xfa/0x790 [ 2276.790855][ T8472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2276.796794][ T8472] RIP: 0033:0x45a919 [ 2276.800716][ T8472] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:59 executing program 5 (fault-call:1 fault-nth:0): r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:07:59 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:07:59 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7a, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:59 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x2, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:07:59 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x300, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:59 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x10, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2276.820423][ T8472] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2276.828942][ T8472] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2276.838093][ T8472] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2276.846796][ T8472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2276.854880][ T8472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2276.854889][ T8472] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:07:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10000000, 0x0, 0x6aa3, 0xffffffff}, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r5, r6, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r4, r1, 0x0, 0x1, &(0x7f0000000480)='\x00', r7}, 0x30) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x0, 0x1f, 0x1f, 0x5, 0x0, 0x5, 0xc4040, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xaa7c, 0x1, @perf_bp={&(0x7f0000000300)}, 0x694, 0x9, 0x7, 0x0, 0x6, 0x0, 0x8001}, r8, 0xa, 0xffffffffffffffff, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:07:59 executing program 4 (fault-call:0 fault-nth:10): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:59 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0xe], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:07:59 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x500, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:07:59 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000000a000000000000000005"}], 0x28}, 0x0) 23:07:59 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x25, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2277.510493][ T8516] FAULT_INJECTION: forcing a failure. [ 2277.510493][ T8516] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2277.590974][ T8516] CPU: 0 PID: 8516 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2277.600129][ T8516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2277.610286][ T8516] Call Trace: [ 2277.613757][ T8516] dump_stack+0x197/0x210 [ 2277.618257][ T8516] should_fail.cold+0xa/0x15 [ 2277.622876][ T8516] ? fault_create_debugfs_attr+0x180/0x180 [ 2277.622894][ T8516] ? ___might_sleep+0x163/0x2c0 [ 2277.622921][ T8516] should_fail_alloc_page+0x50/0x60 [ 2277.622935][ T8516] __alloc_pages_nodemask+0x1a1/0x910 [ 2277.622952][ T8516] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2277.622971][ T8516] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2277.622998][ T8516] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2277.623018][ T8516] alloc_pages_current+0x107/0x210 [ 2277.634344][ T8516] ? ___might_sleep+0x163/0x2c0 [ 2277.634368][ T8516] __vmalloc_node_range+0x4f8/0x810 [ 2277.634393][ T8516] __vmalloc+0x44/0x50 [ 2277.634409][ T8516] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2277.634425][ T8516] pcpu_mem_zalloc+0x8a/0xf0 [ 2277.634441][ T8516] pcpu_create_chunk+0xe0/0x7f0 [ 2277.634468][ T8516] pcpu_alloc+0x10f3/0x1380 [ 2277.701327][ T8516] ? pcpu_alloc_area+0x820/0x820 [ 2277.706560][ T8516] __alloc_percpu_gfp+0x28/0x30 [ 2277.711428][ T8516] array_map_alloc+0x698/0x7d0 [ 2277.716521][ T8516] ? array_of_map_free+0x50/0x50 [ 2277.721667][ T8516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2277.727972][ T8516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2277.734233][ T8516] ? array_of_map_free+0x50/0x50 [ 2277.739193][ T8516] __do_sys_bpf+0x478/0x3610 [ 2277.743841][ T8516] ? bpf_prog_load+0x1960/0x1960 [ 2277.748797][ T8516] ? __kasan_check_write+0x14/0x20 [ 2277.754018][ T8516] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2277.759589][ T8516] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2277.764891][ T8516] ? wait_for_completion+0x440/0x440 [ 2277.770205][ T8516] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2277.776495][ T8516] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2277.781972][ T8516] ? do_syscall_64+0x26/0x790 23:08:00 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0x4e22, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:00 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0xa, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2277.786755][ T8516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2277.792835][ T8516] ? do_syscall_64+0x26/0x790 [ 2277.797530][ T8516] __x64_sys_bpf+0x73/0xb0 [ 2277.801970][ T8516] do_syscall_64+0xfa/0x790 [ 2277.806507][ T8516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2277.812494][ T8516] RIP: 0033:0x45a919 [ 2277.816396][ T8516] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:08:00 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000000e000000000000000005"}], 0x28}, 0x0) 23:08:00 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x600, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2277.836102][ T8516] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2277.836118][ T8516] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2277.836126][ T8516] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2277.836134][ T8516] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2277.836143][ T8516] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2277.836150][ T8516] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:00 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000010000000000000000005"}], 0x28}, 0x0) 23:08:00 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x700, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b70300007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:00 executing program 4 (fault-call:0 fault-nth:11): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:00 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0xf], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:00 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x63, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:00 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000011000000000000000005"}], 0x28}, 0x0) 23:08:00 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4800, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:00 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4c00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:00 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000020000000000000000005"}], 0x28}, 0x0) 23:08:00 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e23, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2278.397734][ T8556] FAULT_INJECTION: forcing a failure. [ 2278.397734][ T8556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:00 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x10], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2278.465118][ T8556] CPU: 1 PID: 8556 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2278.473920][ T8556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.483984][ T8556] Call Trace: [ 2278.487300][ T8556] dump_stack+0x197/0x210 [ 2278.491669][ T8556] should_fail.cold+0xa/0x15 [ 2278.496288][ T8556] ? fault_create_debugfs_attr+0x180/0x180 [ 2278.502207][ T8556] ? ___might_sleep+0x163/0x2c0 [ 2278.507124][ T8556] should_fail_alloc_page+0x50/0x60 [ 2278.512375][ T8556] __alloc_pages_nodemask+0x1a1/0x910 [ 2278.517863][ T8556] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2278.523792][ T8556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2278.530270][ T8556] ? find_next_bit+0x107/0x130 [ 2278.535175][ T8556] pcpu_populate_chunk+0xf8/0x940 [ 2278.540242][ T8556] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2278.546071][ T8556] ? find_next_bit+0xc7/0x130 [ 2278.550788][ T8556] pcpu_alloc+0xd5b/0x1380 [ 2278.555329][ T8556] ? pcpu_alloc_area+0x820/0x820 [ 2278.560293][ T8556] ? kasan_kmalloc+0x9/0x10 23:08:01 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6800, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:01 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000003f000000000000000005"}], 0x28}, 0x0) [ 2278.565164][ T8556] ? __kmalloc_node+0x4e/0x70 [ 2278.570143][ T8556] __alloc_percpu_gfp+0x28/0x30 [ 2278.575020][ T8556] array_map_alloc+0x698/0x7d0 [ 2278.579851][ T8556] ? array_of_map_free+0x50/0x50 [ 2278.584816][ T8556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2278.591877][ T8556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2278.598561][ T8556] ? array_of_map_free+0x50/0x50 [ 2278.603525][ T8556] __do_sys_bpf+0x478/0x3610 [ 2278.603546][ T8556] ? bpf_prog_load+0x1960/0x1960 [ 2278.603561][ T8556] ? __kasan_check_write+0x14/0x20 [ 2278.603583][ T8556] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2278.613118][ T8556] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2278.613143][ T8556] ? wait_for_completion+0x440/0x440 [ 2278.613167][ T8556] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2278.613203][ T8556] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2278.647369][ T8556] ? do_syscall_64+0x26/0x790 [ 2278.652469][ T8556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.658666][ T8556] ? do_syscall_64+0x26/0x790 [ 2278.664258][ T8556] __x64_sys_bpf+0x73/0xb0 [ 2278.668806][ T8556] do_syscall_64+0xfa/0x790 [ 2278.673351][ T8556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2278.679711][ T8556] RIP: 0033:0x45a919 [ 2278.683627][ T8556] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2278.703530][ T8556] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2278.711959][ T8556] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2278.720122][ T8556] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2278.728115][ T8556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2278.736276][ T8556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2278.744370][ T8556] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:01 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6c00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:01 executing program 4 (fault-call:0 fault-nth:12): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000400)='sr {\xddP\x1c\x10}\xa5\xcd\xeef1?\x01OIv.\x10\xb0~\x8f\xf3Wr\x85\xc7p[\x8d|\x9e\xc1\x8en\xd3\xbdks\xd1\xc5\xf9x\xb04\x0f\x9b\x02\xf0S\xb4\x02\n 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2279.283364][ T8585] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2279.291881][ T8585] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2279.299962][ T8585] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:01 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000004c000000000000000005"}], 0x28}, 0x0) [ 2279.307958][ T8585] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2279.315966][ T8585] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2279.324054][ T8585] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00e3ff00850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r1, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000480)='vmnet1!#@&\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000300)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x7f, 0x9, 0x9, 0x2, 0x0, 0x51, 0x40000, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xbb0, 0x4, @perf_config_ext={0x3, 0x4}, 0x48010, 0xfff, 0x3ff, 0x3, 0x8, 0x3269, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:02 executing program 4 (fault-call:0 fault-nth:13): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:02 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xff00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:02 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000060000000000000000005"}], 0x28}, 0x0) 23:08:02 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:02 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x12], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:02 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000068000000000000000005"}], 0x28}, 0x0) 23:08:02 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x40000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2279.819213][ T8627] FAULT_INJECTION: forcing a failure. [ 2279.819213][ T8627] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2279.883708][ T8627] CPU: 1 PID: 8627 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2279.892352][ T8627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2279.902418][ T8627] Call Trace: [ 2279.905736][ T8627] dump_stack+0x197/0x210 [ 2279.910092][ T8627] should_fail.cold+0xa/0x15 [ 2279.914880][ T8627] ? fault_create_debugfs_attr+0x180/0x180 [ 2279.920792][ T8627] ? ___might_sleep+0x163/0x2c0 [ 2279.925766][ T8627] should_fail_alloc_page+0x50/0x60 23:08:02 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x5, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2279.930979][ T8627] __alloc_pages_nodemask+0x1a1/0x910 [ 2279.938027][ T8627] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2279.943779][ T8627] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2279.950228][ T8627] ? find_next_bit+0x107/0x130 [ 2279.955020][ T8627] pcpu_populate_chunk+0xf8/0x940 [ 2279.960186][ T8627] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2279.965929][ T8627] ? find_next_bit+0xc7/0x130 [ 2279.970644][ T8627] pcpu_alloc+0xd5b/0x1380 [ 2279.975089][ T8627] ? pcpu_alloc_area+0x820/0x820 [ 2279.980058][ T8627] __alloc_percpu_gfp+0x28/0x30 [ 2279.984930][ T8627] array_map_alloc+0x698/0x7d0 [ 2279.989719][ T8627] ? array_of_map_free+0x50/0x50 [ 2279.994678][ T8627] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2280.000941][ T8627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2280.007212][ T8627] ? array_of_map_free+0x50/0x50 [ 2280.012174][ T8627] __do_sys_bpf+0x478/0x3610 [ 2280.016800][ T8627] ? bpf_prog_load+0x1960/0x1960 [ 2280.021844][ T8627] ? __kasan_check_write+0x14/0x20 [ 2280.027236][ T8627] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2280.032995][ T8627] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2280.038393][ T8627] ? wait_for_completion+0x440/0x440 [ 2280.043885][ T8627] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2280.051032][ T8627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2280.056702][ T8627] ? do_syscall_64+0x26/0x790 [ 2280.061403][ T8627] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2280.067667][ T8627] ? do_syscall_64+0x26/0x790 [ 2280.072370][ T8627] __x64_sys_bpf+0x73/0xb0 [ 2280.076814][ T8627] do_syscall_64+0xfa/0x790 [ 2280.081343][ T8627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2280.087332][ T8627] RIP: 0033:0x45a919 [ 2280.091307][ T8627] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2280.112199][ T8627] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2280.122471][ T8627] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:02 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x1000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2280.130481][ T8627] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2280.138521][ T8627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2280.146511][ T8627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2280.156321][ T8627] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:02 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:02 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000006c000000000000000005"}], 0x28}, 0x0) 23:08:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b70203000000eeffff7a0af0657c796346718c850afff8ffff000090000000000000b70600006521fdb90e09eae40101000000000000ffffff2d6405000007fdc365040400050000000001007d60b7030000000000007a0a00f600000000850000000d000000b7000001000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r1, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r1, 0x0, 0xb, 0x28, &(0x7f0000000300)="9b55fc631a049669b5c9bf", &(0x7f0000000400)=""/40, 0x80, 0x0, 0x97, 0x97, &(0x7f0000000440)="afaf9a00d974f3c38f3bb713b17f1bc122ef206c403fe97ed56167d044a26b73a7fc4d90425b87b3c3fc4c71b4f6ad0c69f8b58736f4ff49f4315995a01b8da7c5fcd798459ae996a8e4481461e00602394306a2e4c18a39ab302d9770adbd03afe2027dc6c6d37ccc97e9da638d5cf4c8c80aa41aa99fea855fd38a9eb9310b97a3904ca6a44ef75c3ecab26ed52eb4dfd2a344215377", &(0x7f0000000500)="b734815f9ab72d3d69d152319d7fa79c93e0d3f14c822c7309e04390f6678c3c5b814130ea52d50ac1535849302501ef613899bab210edd3d2a4b0176ef2dae69a546c5b15e4f0ecfc8cf903831a0f45611fb59b6036adfcad2ed5e8c3ffd7a3b30570e6c6a904f5badac57f080583ad2122ce4f3003f8c26342512c7d15bd7b0ab141da165aac47de0d9dba16b5328168efb4f91be98e"}, 0x40) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:03 executing program 4 (fault-call:0 fault-nth:14): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:03 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x2000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:03 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:03 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000074000000000000000005"}], 0x28}, 0x0) 23:08:03 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x13], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:03 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x3000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:03 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x8, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:03 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000007a000000000000000005"}], 0x28}, 0x0) 23:08:03 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:03 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x14], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2281.118996][ T8678] FAULT_INJECTION: forcing a failure. [ 2281.118996][ T8678] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:03 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000ffffff8d000000000000000005"}], 0x28}, 0x0) [ 2281.228032][ T8678] CPU: 1 PID: 8678 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2281.237117][ T8678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.247713][ T8678] Call Trace: [ 2281.251031][ T8678] dump_stack+0x197/0x210 [ 2281.255671][ T8678] should_fail.cold+0xa/0x15 [ 2281.260295][ T8678] ? fault_create_debugfs_attr+0x180/0x180 [ 2281.266221][ T8678] ? ___might_sleep+0x163/0x2c0 [ 2281.271130][ T8678] should_fail_alloc_page+0x50/0x60 [ 2281.276417][ T8678] __alloc_pages_nodemask+0x1a1/0x910 [ 2281.281946][ T8678] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2281.287836][ T8678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2281.294196][ T8678] ? find_next_bit+0x107/0x130 [ 2281.298989][ T8678] pcpu_populate_chunk+0xf8/0x940 [ 2281.304487][ T8678] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2281.310356][ T8678] ? find_next_bit+0xc7/0x130 [ 2281.316804][ T8678] pcpu_alloc+0xd5b/0x1380 [ 2281.322023][ T8678] ? pcpu_alloc_area+0x820/0x820 [ 2281.327185][ T8678] __alloc_percpu_gfp+0x28/0x30 [ 2281.332413][ T8678] array_map_alloc+0x698/0x7d0 [ 2281.337299][ T8678] ? array_of_map_free+0x50/0x50 [ 2281.342259][ T8678] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2281.348524][ T8678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2281.354786][ T8678] ? array_of_map_free+0x50/0x50 [ 2281.359744][ T8678] __do_sys_bpf+0x478/0x3610 [ 2281.364411][ T8678] ? bpf_prog_load+0x1960/0x1960 [ 2281.369448][ T8678] ? __kasan_check_write+0x14/0x20 [ 2281.375196][ T8678] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2281.380948][ T8678] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2281.387490][ T8678] ? wait_for_completion+0x440/0x440 [ 2281.393161][ T8678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2281.399442][ T8678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2281.405443][ T8678] ? do_syscall_64+0x26/0x790 [ 2281.410205][ T8678] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2281.416285][ T8678] ? do_syscall_64+0x26/0x790 [ 2281.420983][ T8678] __x64_sys_bpf+0x73/0xb0 [ 2281.425417][ T8678] do_syscall_64+0xfa/0x790 [ 2281.430114][ T8678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2281.436019][ T8678] RIP: 0033:0x45a919 [ 2281.439941][ T8678] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2281.459559][ T8678] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2281.467979][ T8678] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:03 executing program 4 (fault-call:0 fault-nth:15): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:03 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x48, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:03 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000000005aa000000000000000005"}], 0x28}, 0x0) 23:08:03 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x5000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2281.475954][ T8678] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2281.475963][ T8678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2281.475971][ T8678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2281.475979][ T8678] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003001e00bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001087d60b7030000000000007a0a000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:04 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x15], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:04 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:04 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000000000bb8000000000000000005"}], 0x28}, 0x0) 23:08:04 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4c, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2281.734010][ T8704] FAULT_INJECTION: forcing a failure. [ 2281.734010][ T8704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2281.859292][ T8704] CPU: 1 PID: 8704 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2281.867930][ T8704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2281.878034][ T8704] Call Trace: [ 2281.881372][ T8704] dump_stack+0x197/0x210 [ 2281.885821][ T8704] should_fail.cold+0xa/0x15 [ 2281.890438][ T8704] ? fault_create_debugfs_attr+0x180/0x180 [ 2281.896766][ T8704] ? ___might_sleep+0x163/0x2c0 [ 2281.901865][ T8704] should_fail_alloc_page+0x50/0x60 23:08:04 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000fffffdef000000000000000005"}], 0x28}, 0x0) [ 2281.907087][ T8704] __alloc_pages_nodemask+0x1a1/0x910 [ 2281.912486][ T8704] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2281.918234][ T8704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2281.924522][ T8704] ? find_next_bit+0x107/0x130 [ 2281.929325][ T8704] pcpu_populate_chunk+0xf8/0x940 [ 2281.934373][ T8704] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2281.940116][ T8704] ? find_next_bit+0xc7/0x130 [ 2281.944821][ T8704] pcpu_alloc+0xd5b/0x1380 [ 2281.949284][ T8704] ? pcpu_alloc_area+0x820/0x820 [ 2281.954255][ T8704] __alloc_percpu_gfp+0x28/0x30 23:08:04 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x68, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2281.959130][ T8704] array_map_alloc+0x698/0x7d0 [ 2281.963936][ T8704] ? array_of_map_free+0x50/0x50 [ 2281.968902][ T8704] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2281.975200][ T8704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2281.981596][ T8704] ? array_of_map_free+0x50/0x50 [ 2281.986575][ T8704] __do_sys_bpf+0x478/0x3610 [ 2281.991208][ T8704] ? bpf_prog_load+0x1960/0x1960 [ 2281.996164][ T8704] ? __kasan_check_write+0x14/0x20 [ 2282.001393][ T8704] ? __mutex_unlock_slowpath+0xf0/0x6a0 23:08:04 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000fffffff5000000000000000005"}], 0x28}, 0x0) [ 2282.008083][ T8704] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2282.013420][ T8704] ? wait_for_completion+0x440/0x440 [ 2282.018768][ T8704] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2282.025146][ T8704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2282.030755][ T8704] ? do_syscall_64+0x26/0x790 [ 2282.035460][ T8704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2282.041560][ T8704] ? do_syscall_64+0x26/0x790 [ 2282.046265][ T8704] __x64_sys_bpf+0x73/0xb0 [ 2282.050733][ T8704] do_syscall_64+0xfa/0x790 [ 2282.055269][ T8704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2282.061279][ T8704] RIP: 0033:0x45a919 [ 2282.065806][ T8704] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2282.085631][ T8704] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2282.094077][ T8704] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2282.102064][ T8704] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2282.110049][ T8704] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2282.118038][ T8704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2282.126026][ T8704] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:04 executing program 4 (fault-call:0 fault-nth:16): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:04 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6c, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:04 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000007ffffff7000000000000000005"}], 0x28}, 0x0) 23:08:04 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x9) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:04 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x16], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2282.324870][ T8738] FAULT_INJECTION: forcing a failure. [ 2282.324870][ T8738] name failslab, interval 1, probability 0, space 0, times 0 [ 2282.407512][ T8738] CPU: 1 PID: 8738 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2282.416156][ T8738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2282.426580][ T8738] Call Trace: [ 2282.429924][ T8738] dump_stack+0x197/0x210 [ 2282.434282][ T8738] should_fail.cold+0xa/0x15 [ 2282.438899][ T8738] ? fault_create_debugfs_attr+0x180/0x180 [ 2282.444734][ T8738] ? ___might_sleep+0x163/0x2c0 [ 2282.449608][ T8738] __should_failslab+0x121/0x190 [ 2282.454575][ T8738] should_failslab+0x9/0x14 [ 2282.459102][ T8738] kmem_cache_alloc_node_trace+0x274/0x750 [ 2282.464939][ T8738] ? do_raw_spin_unlock+0x178/0x270 [ 2282.470150][ T8738] __kmalloc_node+0x3d/0x70 [ 2282.474703][ T8738] __vmalloc_node_range+0x1db/0x810 [ 2282.479929][ T8738] __vmalloc+0x44/0x50 [ 2282.484039][ T8738] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2282.488822][ T8738] pcpu_mem_zalloc+0x8a/0xf0 [ 2282.493429][ T8738] pcpu_create_chunk+0x12d/0x7f0 [ 2282.498389][ T8738] pcpu_alloc+0x10f3/0x1380 [ 2282.502924][ T8738] ? pcpu_alloc_area+0x820/0x820 [ 2282.507891][ T8738] __alloc_percpu_gfp+0x28/0x30 [ 2282.512771][ T8738] array_map_alloc+0x698/0x7d0 [ 2282.517756][ T8738] ? array_of_map_free+0x50/0x50 [ 2282.522803][ T8738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2282.529061][ T8738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2282.535411][ T8738] ? array_of_map_free+0x50/0x50 [ 2282.540377][ T8738] __do_sys_bpf+0x478/0x3610 [ 2282.544994][ T8738] ? bpf_prog_load+0x1960/0x1960 [ 2282.551780][ T8738] ? __kasan_check_write+0x14/0x20 [ 2282.556911][ T8738] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2282.562474][ T8738] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2282.567890][ T8738] ? wait_for_completion+0x440/0x440 [ 2282.573205][ T8738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2282.579490][ T8738] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2282.584971][ T8738] ? do_syscall_64+0x26/0x790 [ 2282.589681][ T8738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2282.596466][ T8738] ? do_syscall_64+0x26/0x790 [ 2282.601176][ T8738] __x64_sys_bpf+0x73/0xb0 [ 2282.608230][ T8738] do_syscall_64+0xfa/0x790 [ 2282.612767][ T8738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2282.618669][ T8738] RIP: 0033:0x45a919 [ 2282.622595][ T8738] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2282.642206][ T8738] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2282.650627][ T8738] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:04 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000000000fc000000000000000005"}], 0x28}, 0x0) 23:08:04 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x74, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:04 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x8000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:04 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000000080fe000000000000000005"}], 0x28}, 0x0) 23:08:05 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7a, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:05 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x48000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2282.658616][ T8738] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2282.666758][ T8738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2282.674767][ T8738] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2282.682756][ T8738] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:05 executing program 4 (fault-call:0 fault-nth:17): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:05 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000000000000c0fe000000000000000005"}], 0x28}, 0x0) 23:08:05 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x300, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:05 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4c000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/25, 0x19}, {&(0x7f0000000480)=""/252, 0xfc}, {&(0x7f0000000580)=""/238, 0xee}], 0x4, &(0x7f00000017c0)=""/197, 0xc5}, 0x1) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:05 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x17], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:05 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000000000ff000000000000000005"}], 0x28}, 0x0) 23:08:05 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x500, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2283.183539][ T8779] FAULT_INJECTION: forcing a failure. [ 2283.183539][ T8779] name failslab, interval 1, probability 0, space 0, times 0 [ 2283.213244][ T8779] CPU: 0 PID: 8779 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2283.221880][ T8779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.231946][ T8779] Call Trace: [ 2283.235244][ T8779] dump_stack+0x197/0x210 [ 2283.235264][ T8779] should_fail.cold+0xa/0x15 [ 2283.235281][ T8779] ? fault_create_debugfs_attr+0x180/0x180 [ 2283.235300][ T8779] ? ___might_sleep+0x163/0x2c0 [ 2283.235319][ T8779] __should_failslab+0x121/0x190 [ 2283.235340][ T8779] should_failslab+0x9/0x14 [ 2283.235354][ T8779] kmem_cache_alloc_node_trace+0x274/0x750 [ 2283.235374][ T8779] ? do_raw_spin_unlock+0x178/0x270 [ 2283.275875][ T8779] __kmalloc_node+0x3d/0x70 [ 2283.280404][ T8779] __vmalloc_node_range+0x1db/0x810 [ 2283.285637][ T8779] __vmalloc+0x44/0x50 [ 2283.289724][ T8779] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2283.294511][ T8779] pcpu_mem_zalloc+0x8a/0xf0 [ 2283.299125][ T8779] pcpu_create_chunk+0x12d/0x7f0 [ 2283.304091][ T8779] pcpu_alloc+0x10f3/0x1380 [ 2283.308626][ T8779] ? pcpu_alloc_area+0x820/0x820 [ 2283.313594][ T8779] __alloc_percpu_gfp+0x28/0x30 [ 2283.318474][ T8779] array_map_alloc+0x698/0x7d0 [ 2283.323265][ T8779] ? array_of_map_free+0x50/0x50 [ 2283.328222][ T8779] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2283.334478][ T8779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2283.340742][ T8779] ? array_of_map_free+0x50/0x50 [ 2283.345703][ T8779] __do_sys_bpf+0x478/0x3610 [ 2283.350321][ T8779] ? bpf_prog_load+0x1960/0x1960 [ 2283.355272][ T8779] ? __kasan_check_write+0x14/0x20 [ 2283.360629][ T8779] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2283.366195][ T8779] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2283.371500][ T8779] ? wait_for_completion+0x440/0x440 [ 2283.376825][ T8779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2283.383104][ T8779] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2283.388580][ T8779] ? do_syscall_64+0x26/0x790 [ 2283.393266][ T8779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2283.393282][ T8779] ? do_syscall_64+0x26/0x790 [ 2283.393304][ T8779] __x64_sys_bpf+0x73/0xb0 [ 2283.393322][ T8779] do_syscall_64+0xfa/0x790 [ 2283.393345][ T8779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2283.393355][ T8779] RIP: 0033:0x45a919 [ 2283.393376][ T8779] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2283.404100][ T8779] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2283.404115][ T8779] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2283.404125][ T8779] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2283.404134][ T8779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2283.404142][ T8779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 23:08:05 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000000ffffffff000000000000000005"}], 0x28}, 0x0) 23:08:05 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x68000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:05 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x18], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:05 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x600, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2283.404150][ T8779] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:06 executing program 4 (fault-call:0 fault-nth:18): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:06 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x700, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:06 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6c000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:06 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2283.924645][ T8812] FAULT_INJECTION: forcing a failure. [ 2283.924645][ T8812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2283.953077][ T8812] CPU: 1 PID: 8812 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2283.961704][ T8812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2283.971755][ T8812] Call Trace: [ 2283.975053][ T8812] dump_stack+0x197/0x210 [ 2283.975073][ T8812] should_fail.cold+0xa/0x15 [ 2283.975090][ T8812] ? fault_create_debugfs_attr+0x180/0x180 [ 2283.975107][ T8812] ? ___might_sleep+0x163/0x2c0 [ 2283.975134][ T8812] should_fail_alloc_page+0x50/0x60 [ 2283.999926][ T8812] __alloc_pages_nodemask+0x1a1/0x910 [ 2284.005339][ T8812] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2284.010931][ T8812] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2284.016680][ T8812] ? kasan_unpoison_shadow+0x35/0x50 [ 2284.022048][ T8812] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2284.028327][ T8812] alloc_pages_current+0x107/0x210 [ 2284.033549][ T8812] __vmalloc_node_range+0x4f8/0x810 [ 2284.038783][ T8812] __vmalloc+0x44/0x50 [ 2284.042901][ T8812] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2284.047820][ T8812] pcpu_mem_zalloc+0x8a/0xf0 [ 2284.052438][ T8812] pcpu_create_chunk+0x12d/0x7f0 [ 2284.057392][ T8812] pcpu_alloc+0x10f3/0x1380 [ 2284.061898][ T8812] ? pcpu_alloc_area+0x820/0x820 [ 2284.066850][ T8812] __alloc_percpu_gfp+0x28/0x30 [ 2284.071706][ T8812] array_map_alloc+0x698/0x7d0 [ 2284.076489][ T8812] ? array_of_map_free+0x50/0x50 [ 2284.081468][ T8812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2284.087712][ T8812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2284.094044][ T8812] ? array_of_map_free+0x50/0x50 [ 2284.098967][ T8812] __do_sys_bpf+0x478/0x3610 [ 2284.103545][ T8812] ? bpf_prog_load+0x1960/0x1960 [ 2284.108468][ T8812] ? __kasan_check_write+0x14/0x20 [ 2284.113632][ T8812] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2284.119193][ T8812] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2284.124486][ T8812] ? wait_for_completion+0x440/0x440 [ 2284.129777][ T8812] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2284.136005][ T8812] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2284.141539][ T8812] ? do_syscall_64+0x26/0x790 [ 2284.146198][ T8812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.152366][ T8812] ? do_syscall_64+0x26/0x790 [ 2284.157054][ T8812] __x64_sys_bpf+0x73/0xb0 [ 2284.161493][ T8812] do_syscall_64+0xfa/0x790 [ 2284.165993][ T8812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.171865][ T8812] RIP: 0033:0x45a919 [ 2284.175764][ T8812] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2284.196246][ T8812] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2284.204694][ T8812] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2284.212724][ T8812] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000001880)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0xffffff7f, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000002e000504d22780648c6394fb0124fc0010000b400c000200053582c137153e37090001802f643000d1bd", 0x2e}], 0x1}, 0x0) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) write$cgroup_int(r3, &(0x7f0000000400)=0xfff, 0x12) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:06 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "004000a0ffffffff000000000000000005"}], 0x28}, 0x0) 23:08:06 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x74000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:06 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x3f00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:06 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x2], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2284.220722][ T8812] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2284.229195][ T8812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2284.237157][ T8812] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:06 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4800, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:06 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7a000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:06 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00a000a0ffffffff000000000000000005"}], 0x28}, 0x0) 23:08:06 executing program 4 (fault-call:0 fault-nth:19): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:06 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4c00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:06 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7ffffff7, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:07 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x3], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2284.633714][ T8839] FAULT_INJECTION: forcing a failure. [ 2284.633714][ T8839] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2284.702961][ T8839] CPU: 0 PID: 8839 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2284.712556][ T8839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2284.722979][ T8839] Call Trace: [ 2284.726294][ T8839] dump_stack+0x197/0x210 [ 2284.730723][ T8839] should_fail.cold+0xa/0x15 [ 2284.735361][ T8839] ? fault_create_debugfs_attr+0x180/0x180 [ 2284.741182][ T8839] ? ___might_sleep+0x163/0x2c0 [ 2284.746091][ T8839] should_fail_alloc_page+0x50/0x60 [ 2284.751315][ T8839] __alloc_pages_nodemask+0x1a1/0x910 [ 2284.756708][ T8839] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2284.762310][ T8839] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2284.768069][ T8839] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2284.774427][ T8839] alloc_pages_current+0x107/0x210 [ 2284.779552][ T8839] ? ___might_sleep+0x163/0x2c0 [ 2284.784522][ T8839] __vmalloc_node_range+0x4f8/0x810 [ 2284.789926][ T8839] __vmalloc+0x44/0x50 [ 2284.794042][ T8839] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2284.798823][ T8839] pcpu_mem_zalloc+0x8a/0xf0 [ 2284.803417][ T8839] pcpu_create_chunk+0x12d/0x7f0 [ 2284.808390][ T8839] pcpu_alloc+0x10f3/0x1380 [ 2284.812915][ T8839] ? pcpu_alloc_area+0x820/0x820 [ 2284.818061][ T8839] __alloc_percpu_gfp+0x28/0x30 [ 2284.822931][ T8839] array_map_alloc+0x698/0x7d0 [ 2284.827725][ T8839] ? array_of_map_free+0x50/0x50 [ 2284.832685][ T8839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2284.838939][ T8839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2284.845196][ T8839] ? array_of_map_free+0x50/0x50 [ 2284.850584][ T8839] __do_sys_bpf+0x478/0x3610 [ 2284.855200][ T8839] ? bpf_prog_load+0x1960/0x1960 [ 2284.860155][ T8839] ? __kasan_check_write+0x14/0x20 [ 2284.865289][ T8839] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2284.870838][ T8839] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2284.877182][ T8839] ? wait_for_completion+0x440/0x440 [ 2284.883374][ T8839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2284.889640][ T8839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2284.895121][ T8839] ? do_syscall_64+0x26/0x790 [ 2284.899839][ T8839] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.905920][ T8839] ? do_syscall_64+0x26/0x790 [ 2284.910624][ T8839] __x64_sys_bpf+0x73/0xb0 [ 2284.915071][ T8839] do_syscall_64+0xfa/0x790 [ 2284.919611][ T8839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2284.925524][ T8839] RIP: 0033:0x45a919 [ 2284.929477][ T8839] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2284.949107][ T8839] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2284.949122][ T8839] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2284.949130][ T8839] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2284.949138][ T8839] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2284.949145][ T8839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2284.949153][ T8839] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xc, 0x32, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x53f6eb48}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:07 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6800, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:07 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0002000000000000000000000000000005"}], 0x28}, 0x0) 23:08:07 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xf7ffff7f, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:07 executing program 4 (fault-call:0 fault-nth:20): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:07 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x4], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:07 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6c00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2285.318584][ T8862] FAULT_INJECTION: forcing a failure. [ 2285.318584][ T8862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:07 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0003000000000000000000000000000005"}], 0x28}, 0x0) [ 2285.392772][ T8862] CPU: 0 PID: 8862 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2285.401408][ T8862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2285.411472][ T8862] Call Trace: [ 2285.414781][ T8862] dump_stack+0x197/0x210 [ 2285.414802][ T8862] should_fail.cold+0xa/0x15 [ 2285.414819][ T8862] ? fault_create_debugfs_attr+0x180/0x180 [ 2285.414835][ T8862] ? ___might_sleep+0x163/0x2c0 [ 2285.414859][ T8862] should_fail_alloc_page+0x50/0x60 [ 2285.414872][ T8862] __alloc_pages_nodemask+0x1a1/0x910 [ 2285.414892][ T8862] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2285.450835][ T8862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2285.457097][ T8862] ? find_next_bit+0x107/0x130 [ 2285.462002][ T8862] pcpu_populate_chunk+0xf8/0x940 [ 2285.467047][ T8862] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2285.472985][ T8862] ? find_next_bit+0xc7/0x130 [ 2285.477703][ T8862] pcpu_alloc+0xd5b/0x1380 [ 2285.482252][ T8862] ? pcpu_alloc_area+0x820/0x820 [ 2285.487216][ T8862] __alloc_percpu_gfp+0x28/0x30 [ 2285.492091][ T8862] array_map_alloc+0x698/0x7d0 [ 2285.496864][ T8862] ? array_of_map_free+0x50/0x50 [ 2285.496885][ T8862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2285.496901][ T8862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2285.496916][ T8862] ? array_of_map_free+0x50/0x50 [ 2285.496933][ T8862] __do_sys_bpf+0x478/0x3610 [ 2285.496952][ T8862] ? bpf_prog_load+0x1960/0x1960 [ 2285.496971][ T8862] ? __kasan_check_write+0x14/0x20 [ 2285.533920][ T8862] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2285.539504][ T8862] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2285.545333][ T8862] ? wait_for_completion+0x440/0x440 [ 2285.550645][ T8862] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2285.556936][ T8862] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2285.562500][ T8862] ? do_syscall_64+0x26/0x790 [ 2285.567195][ T8862] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2285.573289][ T8862] ? do_syscall_64+0x26/0x790 [ 2285.577990][ T8862] __x64_sys_bpf+0x73/0xb0 [ 2285.582408][ T8862] do_syscall_64+0xfa/0x790 [ 2285.587372][ T8862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2285.593640][ T8862] RIP: 0033:0x45a919 [ 2285.598443][ T8862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2285.618472][ T8862] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2285.626992][ T8862] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2285.635075][ T8862] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x26, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000000000000000000002e3ff000000"], 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r1, r2, 0x1, 0x2}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xc0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000a00)={0x5, 0xe, 0x100006, 0xffffffff}, &(0x7f0000000800)=0x4230, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=0x4b}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xe, 0x3, &(0x7f0000000500)=@raw=[@ldst={0x1, 0xdb50a074e7891153, 0x1, 0x4, 0x2, 0xfffffffffffffffc, 0x2452ef21955259e2}, @ldst={0x2, 0x53b7a08f95e7bff5, 0x2, 0xa, 0x3, 0x50}, @exit], &(0x7f0000000540)='syzkaller\x00', 0x4, 0x83, &(0x7f0000000580)=""/131, 0x61880, 0x4, [], r1, 0x0, r3, 0x8, &(0x7f0000000640)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x7, 0x80000000}, 0x10, r4, r5}, 0x78) r6 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='memory.events\x00', 0x7a05, 0x1700) close(r7) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r7, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r6, 0xc, r7, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r8) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r8, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x1, 0x40, 0x5, 0x0, 0x0, 0x7fff, 0x84448, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000300), 0x1}, 0x400, 0x10000, 0x200, 0xc, 0xffff, 0x401, 0x1}, 0xffffffffffffffff, 0x8, r8, 0x12) 23:08:07 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0004000000000000000000000000000005"}], 0x28}, 0x0) 23:08:08 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7400, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2285.643063][ T8862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2285.651135][ T8862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2285.659120][ T8862] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:08 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0005000000000000000000000000000005"}], 0x28}, 0x0) 23:08:08 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xff000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:08 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x17}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:08 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7a00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:08 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x5], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:08 executing program 4 (fault-call:0 fault-nth:21): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060020ffffffff2d640500e9ffffff64040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:08 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x1b}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:08 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0006000000000000000000000000000005"}], 0x28}, 0x0) [ 2286.142041][ T8902] FAULT_INJECTION: forcing a failure. [ 2286.142041][ T8902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2286.184568][ T8902] CPU: 1 PID: 8902 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2286.194541][ T8902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.205063][ T8902] Call Trace: [ 2286.208389][ T8902] dump_stack+0x197/0x210 [ 2286.212835][ T8902] should_fail.cold+0xa/0x15 [ 2286.217453][ T8902] ? fault_create_debugfs_attr+0x180/0x180 [ 2286.223285][ T8902] ? ___might_sleep+0x163/0x2c0 [ 2286.228344][ T8902] should_fail_alloc_page+0x50/0x60 [ 2286.233565][ T8902] __alloc_pages_nodemask+0x1a1/0x910 [ 2286.239402][ T8902] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2286.245175][ T8902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2286.251445][ T8902] ? find_next_bit+0x107/0x130 [ 2286.256233][ T8902] pcpu_populate_chunk+0xf8/0x940 [ 2286.261375][ T8902] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2286.267121][ T8902] ? find_next_bit+0xc7/0x130 [ 2286.271874][ T8902] pcpu_alloc+0xd5b/0x1380 [ 2286.276324][ T8902] ? pcpu_alloc_area+0x820/0x820 [ 2286.281323][ T8902] __alloc_percpu_gfp+0x28/0x30 [ 2286.286203][ T8902] array_map_alloc+0x698/0x7d0 [ 2286.291007][ T8902] ? array_of_map_free+0x50/0x50 [ 2286.296859][ T8902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2286.303125][ T8902] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2286.309391][ T8902] ? array_of_map_free+0x50/0x50 [ 2286.314472][ T8902] __do_sys_bpf+0x478/0x3610 [ 2286.319180][ T8902] ? bpf_prog_load+0x1960/0x1960 [ 2286.324130][ T8902] ? __kasan_check_write+0x14/0x20 [ 2286.324146][ T8902] ? __mutex_unlock_slowpath+0xf0/0x6a0 23:08:08 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:08 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xff00, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2286.324161][ T8902] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2286.324181][ T8902] ? wait_for_completion+0x440/0x440 [ 2286.324202][ T8902] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2286.324230][ T8902] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2286.357116][ T8902] ? do_syscall_64+0x26/0x790 [ 2286.361829][ T8902] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.367928][ T8902] ? do_syscall_64+0x26/0x790 [ 2286.372897][ T8902] __x64_sys_bpf+0x73/0xb0 [ 2286.377340][ T8902] do_syscall_64+0xfa/0x790 23:08:08 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x40000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2286.382066][ T8902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2286.387997][ T8902] RIP: 0033:0x45a919 [ 2286.391911][ T8902] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2286.411531][ T8902] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2286.420328][ T8902] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:08 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0007000000000000000000000000000005"}], 0x28}, 0x0) 23:08:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) socket$kcm(0x29, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:08 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x2]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2286.428318][ T8902] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2286.436753][ T8902] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2286.444732][ T8902] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2286.444740][ T8902] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:08 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0008000000000000000000000000000005"}], 0x28}, 0x0) 23:08:09 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x6], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:09 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x3]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:09 executing program 4 (fault-call:0 fault-nth:22): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:09 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x1000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2286.921727][ T8939] FAULT_INJECTION: forcing a failure. [ 2286.921727][ T8939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:09 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0009000000000000000000000000000005"}], 0x28}, 0x0) [ 2286.967649][ T8939] CPU: 1 PID: 8939 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2286.976471][ T8939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.986713][ T8939] Call Trace: [ 2286.990062][ T8939] dump_stack+0x197/0x210 [ 2286.994418][ T8939] should_fail.cold+0xa/0x15 [ 2286.999483][ T8939] ? fault_create_debugfs_attr+0x180/0x180 [ 2287.005314][ T8939] ? ___might_sleep+0x163/0x2c0 [ 2287.010197][ T8939] should_fail_alloc_page+0x50/0x60 [ 2287.015515][ T8939] __alloc_pages_nodemask+0x1a1/0x910 [ 2287.021012][ T8939] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2287.027063][ T8939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2287.033326][ T8939] ? find_next_bit+0x107/0x130 [ 2287.038125][ T8939] pcpu_populate_chunk+0xf8/0x940 [ 2287.043215][ T8939] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2287.048970][ T8939] ? find_next_bit+0xc7/0x130 [ 2287.053694][ T8939] pcpu_alloc+0xd5b/0x1380 [ 2287.058279][ T8939] ? pcpu_alloc_area+0x820/0x820 [ 2287.063244][ T8939] __alloc_percpu_gfp+0x28/0x30 [ 2287.068110][ T8939] array_map_alloc+0x698/0x7d0 [ 2287.076034][ T8939] ? array_of_map_free+0x50/0x50 [ 2287.081008][ T8939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2287.087272][ T8939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2287.094068][ T8939] ? array_of_map_free+0x50/0x50 [ 2287.099211][ T8939] __do_sys_bpf+0x478/0x3610 [ 2287.103922][ T8939] ? bpf_prog_load+0x1960/0x1960 [ 2287.108886][ T8939] ? __kasan_check_write+0x14/0x20 [ 2287.114541][ T8939] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2287.120129][ T8939] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2287.125435][ T8939] ? wait_for_completion+0x440/0x440 [ 2287.130743][ T8939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2287.137449][ T8939] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2287.143031][ T8939] ? do_syscall_64+0x26/0x790 [ 2287.147927][ T8939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.154104][ T8939] ? do_syscall_64+0x26/0x790 [ 2287.158806][ T8939] __x64_sys_bpf+0x73/0xb0 [ 2287.163321][ T8939] do_syscall_64+0xfa/0x790 [ 2287.167850][ T8939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.173856][ T8939] RIP: 0033:0x45a919 [ 2287.177782][ T8939] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.197753][ T8939] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2287.206451][ T8939] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:09 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x2000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:09 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x4]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:09 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000a000000000000000000000000000005"}], 0x28}, 0x0) [ 2287.215143][ T8939] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2287.223314][ T8939] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2287.231394][ T8939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2287.239382][ T8939] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:09 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x7], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, r1, 0xd, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:09 executing program 4 (fault-call:0 fault-nth:23): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:09 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x5]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:09 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x3000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:09 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000e000000000000000000000000000005"}], 0x28}, 0x0) 23:08:10 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x6]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:10 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:10 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x8], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2287.686495][ T8970] FAULT_INJECTION: forcing a failure. [ 2287.686495][ T8970] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:10 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0010000000000000000000000000000005"}], 0x28}, 0x0) [ 2287.815935][ T8970] CPU: 0 PID: 8970 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2287.824664][ T8970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.824671][ T8970] Call Trace: [ 2287.824697][ T8970] dump_stack+0x197/0x210 [ 2287.824723][ T8970] should_fail.cold+0xa/0x15 [ 2287.824741][ T8970] ? fault_create_debugfs_attr+0x180/0x180 [ 2287.824759][ T8970] ? ___might_sleep+0x163/0x2c0 [ 2287.824784][ T8970] should_fail_alloc_page+0x50/0x60 [ 2287.863153][ T8970] __alloc_pages_nodemask+0x1a1/0x910 [ 2287.868576][ T8970] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2287.874327][ T8970] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2287.880611][ T8970] ? find_next_bit+0x107/0x130 [ 2287.885427][ T8970] pcpu_populate_chunk+0xf8/0x940 [ 2287.885449][ T8970] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2287.896972][ T8970] ? find_next_bit+0xc7/0x130 [ 2287.901673][ T8970] pcpu_alloc+0xd5b/0x1380 [ 2287.906124][ T8970] ? pcpu_alloc_area+0x820/0x820 [ 2287.911096][ T8970] __alloc_percpu_gfp+0x28/0x30 [ 2287.915967][ T8970] array_map_alloc+0x698/0x7d0 [ 2287.920869][ T8970] ? array_of_map_free+0x50/0x50 [ 2287.925850][ T8970] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2287.933587][ T8970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2287.939848][ T8970] ? array_of_map_free+0x50/0x50 [ 2287.944833][ T8970] __do_sys_bpf+0x478/0x3610 [ 2287.949449][ T8970] ? bpf_prog_load+0x1960/0x1960 [ 2287.954416][ T8970] ? __kasan_check_write+0x14/0x20 [ 2287.959750][ T8970] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2287.965313][ T8970] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2287.970620][ T8970] ? wait_for_completion+0x440/0x440 [ 2287.975929][ T8970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2287.982200][ T8970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2287.988023][ T8970] ? do_syscall_64+0x26/0x790 [ 2287.992730][ T8970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.998815][ T8970] ? do_syscall_64+0x26/0x790 [ 2288.003527][ T8970] __x64_sys_bpf+0x73/0xb0 [ 2288.007959][ T8970] do_syscall_64+0xfa/0x790 [ 2288.012467][ T8970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.018366][ T8970] RIP: 0033:0x45a919 [ 2288.022271][ T8970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.041889][ T8970] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2288.050318][ T8970] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2288.058305][ T8970] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:10 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x7]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:10 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x5000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:10 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0011000000000000000000000000000005"}], 0x28}, 0x0) [ 2288.066290][ T8970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2288.074285][ T8970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2288.082281][ T8970] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000400)='cgroup.max.descendants\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:10 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x8]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:10 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:10 executing program 4 (fault-call:0 fault-nth:24): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:10 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0048000000000000000000000000000005"}], 0x28}, 0x0) 23:08:10 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x9], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:11 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2288.620575][ T9010] FAULT_INJECTION: forcing a failure. [ 2288.620575][ T9010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2288.661336][ T9010] CPU: 0 PID: 9010 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2288.669962][ T9010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.680125][ T9010] Call Trace: [ 2288.680151][ T9010] dump_stack+0x197/0x210 [ 2288.680169][ T9010] should_fail.cold+0xa/0x15 [ 2288.680185][ T9010] ? fault_create_debugfs_attr+0x180/0x180 [ 2288.680202][ T9010] ? ___might_sleep+0x163/0x2c0 [ 2288.680228][ T9010] should_fail_alloc_page+0x50/0x60 [ 2288.680243][ T9010] __alloc_pages_nodemask+0x1a1/0x910 [ 2288.680263][ T9010] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2288.719482][ T9010] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2288.725232][ T9010] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2288.731492][ T9010] alloc_pages_current+0x107/0x210 [ 2288.731511][ T9010] ? ___might_sleep+0x163/0x2c0 [ 2288.741483][ T9010] __vmalloc_node_range+0x4f8/0x810 [ 2288.746712][ T9010] __vmalloc+0x44/0x50 [ 2288.750804][ T9010] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2288.755601][ T9010] pcpu_mem_zalloc+0x8a/0xf0 [ 2288.761264][ T9010] pcpu_create_chunk+0x12d/0x7f0 [ 2288.766229][ T9010] pcpu_alloc+0x10f3/0x1380 [ 2288.770769][ T9010] ? pcpu_alloc_area+0x820/0x820 [ 2288.775750][ T9010] __alloc_percpu_gfp+0x28/0x30 [ 2288.775767][ T9010] array_map_alloc+0x698/0x7d0 [ 2288.775789][ T9010] ? array_of_map_free+0x50/0x50 [ 2288.791218][ T9010] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2288.791232][ T9010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2288.791249][ T9010] ? array_of_map_free+0x50/0x50 [ 2288.791267][ T9010] __do_sys_bpf+0x478/0x3610 [ 2288.791290][ T9010] ? bpf_prog_load+0x1960/0x1960 [ 2288.819059][ T9010] ? __kasan_check_write+0x14/0x20 [ 2288.824187][ T9010] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2288.829834][ T9010] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2288.835145][ T9010] ? wait_for_completion+0x440/0x440 [ 2288.835171][ T9010] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2288.835199][ T9010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.835213][ T9010] ? do_syscall_64+0x26/0x790 23:08:11 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "004c000000000000000000000000000005"}], 0x28}, 0x0) 23:08:11 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x48]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:11 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x8000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:11 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x4c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2288.835229][ T9010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.835249][ T9010] ? do_syscall_64+0x26/0x790 [ 2288.867602][ T9010] __x64_sys_bpf+0x73/0xb0 [ 2288.872047][ T9010] do_syscall_64+0xfa/0x790 [ 2288.876579][ T9010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.882484][ T9010] RIP: 0033:0x45a919 [ 2288.886392][ T9010] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.906018][ T9010] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2288.906033][ T9010] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2288.906041][ T9010] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2288.906048][ T9010] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2288.906056][ T9010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2288.906064][ T9010] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:11 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0060000000000000000000000000000005"}], 0x28}, 0x0) 23:08:11 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)=""/139, 0x111, 0x8b, 0x1}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000002ffdf40bfa300000000ff123905a527b683e0a72282fd37d31ff8ffffff79ffff2d6405000000000065040400070000000404000001007d60b70300000000f3ff790a00fe00000000850000000d000000b70000000000000095000000000000000000000000000000000000000011571e00"/130], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x240, 0x0, 0x0, 0x1, [], 0x0, 0x12, r0, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8c00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000014c0)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) r9 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, 0x0) close(0xffffffffffffffff) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffe65, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000001c00050fd25a80648c63940d0124fc60100002400a000000053582c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001400)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001440), 0x4) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) 23:08:11 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x3f000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:11 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x68]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:11 executing program 4 (fault-call:0 fault-nth:25): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:11 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0068000000000000000000000000000005"}], 0x28}, 0x0) 23:08:11 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0xa], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:11 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x6c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2289.425750][ T9045] FAULT_INJECTION: forcing a failure. [ 2289.425750][ T9045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:11 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "006c000000000000000000000000000005"}], 0x28}, 0x0) [ 2289.484901][ T9045] CPU: 1 PID: 9045 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2289.493545][ T9045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.503665][ T9045] Call Trace: [ 2289.506996][ T9045] dump_stack+0x197/0x210 [ 2289.511353][ T9045] should_fail.cold+0xa/0x15 [ 2289.516231][ T9045] ? fault_create_debugfs_attr+0x180/0x180 [ 2289.522065][ T9045] ? ___might_sleep+0x163/0x2c0 [ 2289.527136][ T9045] should_fail_alloc_page+0x50/0x60 [ 2289.532356][ T9045] __alloc_pages_nodemask+0x1a1/0x910 [ 2289.537763][ T9045] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2289.543518][ T9045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2289.549968][ T9045] ? find_next_bit+0x107/0x130 [ 2289.554859][ T9045] pcpu_populate_chunk+0xf8/0x940 [ 2289.559916][ T9045] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2289.565674][ T9045] ? find_next_bit+0xc7/0x130 [ 2289.570557][ T9045] pcpu_alloc+0xd5b/0x1380 [ 2289.575201][ T9045] ? pcpu_alloc_area+0x820/0x820 [ 2289.580194][ T9045] __alloc_percpu_gfp+0x28/0x30 23:08:12 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x74]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2289.585075][ T9045] array_map_alloc+0x698/0x7d0 [ 2289.589862][ T9045] ? array_of_map_free+0x50/0x50 [ 2289.594831][ T9045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2289.601096][ T9045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2289.607886][ T9045] ? array_of_map_free+0x50/0x50 [ 2289.612850][ T9045] __do_sys_bpf+0x478/0x3610 [ 2289.617473][ T9045] ? bpf_prog_load+0x1960/0x1960 [ 2289.622702][ T9045] ? __kasan_check_write+0x14/0x20 [ 2289.627835][ T9045] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2289.633405][ T9045] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2289.633422][ T9045] ? wait_for_completion+0x440/0x440 [ 2289.633443][ T9045] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2289.633472][ T9045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2289.633486][ T9045] ? do_syscall_64+0x26/0x790 [ 2289.633507][ T9045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.667442][ T9045] ? do_syscall_64+0x26/0x790 [ 2289.672770][ T9045] __x64_sys_bpf+0x73/0xb0 [ 2289.677317][ T9045] do_syscall_64+0xfa/0x790 23:08:12 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0074000000000000000000000000000005"}], 0x28}, 0x0) [ 2289.681853][ T9045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2289.687768][ T9045] RIP: 0033:0x45a919 [ 2289.691695][ T9045] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2289.711317][ T9045] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2289.719931][ T9045] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2289.727917][ T9045] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:12 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x48000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2289.727929][ T9045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2289.727937][ T9045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2289.727945][ T9045] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:12 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x7a]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:12 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x4c000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:12 executing program 4 (fault-call:0 fault-nth:26): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:12 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0xb], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:12 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "007a000000000000000000000000000005"}], 0x28}, 0x0) 23:08:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d002000b700000000000000950000000000000041e8bd1b60a3f39de393328a1c1ad7e2d1bf6ba5afbd4aeea6a4b2289b13a9309f6f07e3556b36568d935efa339f63cb32e6c12b60500000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0xffffffffffffffff, 0x100}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r1, &(0x7f0000000440)="8e3cc22ca000f7d74a9b867446561f6ac2ca08de9bfea201ef1fcd6620480eab6e36845333bee0aa20f37f55cc2b1faa8255ebbccb172aa976ae73e3118019647c778bceabe451d0cbe7a6af394f972745bd197e6fb1ec2635a9756f716d78803841e7736eca11c2b8cccc24874468e5f47c650f43b5cf92565aaa796faea9008123b0dab0c86af78ed979b83718", &(0x7f0000000500)="982c582386bb6ca9a6cdf45dba4599f12419ad93a73a06bf42f8054fcd23ca1151c456c314d74ec6c7d88ad579dd34ac6b742ac07ee836dd78d8d66c", 0x4}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x8, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000300), 0x1}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r3, 0xc, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:12 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:12 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00fc000000000000000000000000000005"}], 0x28}, 0x0) [ 2290.297080][ T9083] FAULT_INJECTION: forcing a failure. [ 2290.297080][ T9083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2290.325791][ T9083] CPU: 1 PID: 9083 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2290.334428][ T9083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.344695][ T9083] Call Trace: [ 2290.348013][ T9083] dump_stack+0x197/0x210 [ 2290.352360][ T9083] should_fail.cold+0xa/0x15 [ 2290.357217][ T9083] ? fault_create_debugfs_attr+0x180/0x180 [ 2290.357233][ T9083] ? ___might_sleep+0x163/0x2c0 [ 2290.357259][ T9083] should_fail_alloc_page+0x50/0x60 [ 2290.357271][ T9083] __alloc_pages_nodemask+0x1a1/0x910 [ 2290.357286][ T9083] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2290.357305][ T9083] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2290.389834][ T9083] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 23:08:12 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000030000000000000000000000000005"}], 0x28}, 0x0) [ 2290.396103][ T9083] alloc_pages_current+0x107/0x210 [ 2290.401594][ T9083] ? ___might_sleep+0x163/0x2c0 [ 2290.406471][ T9083] __vmalloc_node_range+0x4f8/0x810 [ 2290.411711][ T9083] __vmalloc+0x44/0x50 [ 2290.415799][ T9083] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2290.420582][ T9083] pcpu_mem_zalloc+0x8a/0xf0 [ 2290.425281][ T9083] pcpu_create_chunk+0x12d/0x7f0 [ 2290.430263][ T9083] pcpu_alloc+0x10f3/0x1380 [ 2290.434820][ T9083] ? pcpu_alloc_area+0x820/0x820 [ 2290.439876][ T9083] __alloc_percpu_gfp+0x28/0x30 [ 2290.444769][ T9083] array_map_alloc+0x698/0x7d0 [ 2290.449547][ T9083] ? array_of_map_free+0x50/0x50 [ 2290.454510][ T9083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2290.460942][ T9083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.467184][ T9083] ? array_of_map_free+0x50/0x50 [ 2290.467200][ T9083] __do_sys_bpf+0x478/0x3610 [ 2290.467219][ T9083] ? bpf_prog_load+0x1960/0x1960 [ 2290.467234][ T9083] ? __kasan_check_write+0x14/0x20 [ 2290.467248][ T9083] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2290.467268][ T9083] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2290.498002][ T9083] ? wait_for_completion+0x440/0x440 [ 2290.503985][ T9083] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2290.510378][ T9083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2290.516062][ T9083] ? do_syscall_64+0x26/0x790 [ 2290.520783][ T9083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.526990][ T9083] ? do_syscall_64+0x26/0x790 [ 2290.531696][ T9083] __x64_sys_bpf+0x73/0xb0 [ 2290.536139][ T9083] do_syscall_64+0xfa/0x790 [ 2290.540671][ T9083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.546972][ T9083] RIP: 0033:0x45a919 [ 2290.550896][ T9083] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.570974][ T9083] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2290.570990][ T9083] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2290.570998][ T9083] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:13 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x2]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:13 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x68000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:13 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000050000000000000000000000000005"}], 0x28}, 0x0) 23:08:13 executing program 4 (fault-call:0 fault-nth:27): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2290.571005][ T9083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2290.571013][ T9083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2290.571020][ T9083] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xff) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:13 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x6c000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:13 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0xc], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:13 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x3]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:13 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x74000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2290.728126][ T9101] FAULT_INJECTION: forcing a failure. [ 2290.728126][ T9101] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2290.805183][ T9101] CPU: 0 PID: 9101 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2290.813836][ T9101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.813844][ T9101] Call Trace: [ 2290.813870][ T9101] dump_stack+0x197/0x210 [ 2290.813892][ T9101] should_fail.cold+0xa/0x15 [ 2290.813911][ T9101] ? fault_create_debugfs_attr+0x180/0x180 [ 2290.813927][ T9101] ? ___might_sleep+0x163/0x2c0 [ 2290.813952][ T9101] should_fail_alloc_page+0x50/0x60 [ 2290.813966][ T9101] __alloc_pages_nodemask+0x1a1/0x910 [ 2290.813984][ T9101] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2290.814007][ T9101] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2290.870532][ T9101] ? find_next_bit+0x107/0x130 [ 2290.870569][ T9101] pcpu_populate_chunk+0xf8/0x940 [ 2290.870586][ T9101] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2290.870603][ T9101] ? find_next_bit+0xc7/0x130 [ 2290.890990][ T9101] pcpu_alloc+0xd5b/0x1380 [ 2290.896043][ T9101] ? pcpu_alloc_area+0x820/0x820 [ 2290.901017][ T9101] __alloc_percpu_gfp+0x28/0x30 [ 2290.901037][ T9101] array_map_alloc+0x698/0x7d0 [ 2290.901059][ T9101] ? array_of_map_free+0x50/0x50 [ 2290.901081][ T9101] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2290.915789][ T9101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2290.915808][ T9101] ? array_of_map_free+0x50/0x50 [ 2290.915827][ T9101] __do_sys_bpf+0x478/0x3610 [ 2290.915849][ T9101] ? bpf_prog_load+0x1960/0x1960 [ 2290.915866][ T9101] ? __kasan_check_write+0x14/0x20 [ 2290.915886][ T9101] ? __mutex_unlock_slowpath+0xf0/0x6a0 23:08:13 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7a000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:13 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00aa050000000000000000000000000005"}], 0x28}, 0x0) [ 2290.915901][ T9101] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2290.915918][ T9101] ? wait_for_completion+0x440/0x440 [ 2290.915937][ T9101] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2290.915964][ T9101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2290.915985][ T9101] ? do_syscall_64+0x26/0x790 [ 2290.938176][ T9101] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.938194][ T9101] ? do_syscall_64+0x26/0x790 [ 2290.938219][ T9101] __x64_sys_bpf+0x73/0xb0 [ 2290.938237][ T9101] do_syscall_64+0xfa/0x790 23:08:13 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x4]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2290.938259][ T9101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2290.959148][ T9101] RIP: 0033:0x45a919 [ 2290.970757][ T9101] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.970766][ T9101] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2290.970782][ T9101] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:13 executing program 4 (fault-call:0 fault-nth:28): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:13 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x5]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2290.970791][ T9101] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2290.970800][ T9101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2290.970809][ T9101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2290.970819][ T9101] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:13 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000060000000000000000000000000005"}], 0x28}, 0x0) 23:08:13 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x7ffffff7, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2291.142650][ T9121] FAULT_INJECTION: forcing a failure. [ 2291.142650][ T9121] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2291.177611][ T9121] CPU: 1 PID: 9121 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2291.186277][ T9121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.196429][ T9121] Call Trace: [ 2291.200035][ T9121] dump_stack+0x197/0x210 [ 2291.204833][ T9121] should_fail.cold+0xa/0x15 [ 2291.209645][ T9121] ? fault_create_debugfs_attr+0x180/0x180 [ 2291.217314][ T9121] ? ___might_sleep+0x163/0x2c0 [ 2291.222469][ T9121] should_fail_alloc_page+0x50/0x60 [ 2291.227783][ T9121] __alloc_pages_nodemask+0x1a1/0x910 [ 2291.233365][ T9121] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2291.239309][ T9121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2291.245581][ T9121] ? find_next_bit+0x107/0x130 [ 2291.250494][ T9121] pcpu_populate_chunk+0xf8/0x940 [ 2291.259396][ T9121] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2291.266065][ T9121] ? find_next_bit+0xc7/0x130 [ 2291.270959][ T9121] pcpu_alloc+0xd5b/0x1380 [ 2291.275675][ T9121] ? pcpu_alloc_area+0x820/0x820 [ 2291.280655][ T9121] __alloc_percpu_gfp+0x28/0x30 [ 2291.285545][ T9121] array_map_alloc+0x698/0x7d0 [ 2291.290346][ T9121] ? array_of_map_free+0x50/0x50 [ 2291.295311][ T9121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2291.303268][ T9121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2291.309632][ T9121] ? array_of_map_free+0x50/0x50 [ 2291.314786][ T9121] __do_sys_bpf+0x478/0x3610 [ 2291.319668][ T9121] ? bpf_prog_load+0x1960/0x1960 [ 2291.324638][ T9121] ? __kasan_check_write+0x14/0x20 [ 2291.333615][ T9121] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2291.339447][ T9121] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2291.344758][ T9121] ? wait_for_completion+0x440/0x440 [ 2291.351469][ T9121] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2291.357978][ T9121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2291.363702][ T9121] ? do_syscall_64+0x26/0x790 [ 2291.370047][ T9121] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.377794][ T9121] ? do_syscall_64+0x26/0x790 [ 2291.382814][ T9121] __x64_sys_bpf+0x73/0xb0 [ 2291.387361][ T9121] do_syscall_64+0xfa/0x790 [ 2291.392072][ T9121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2291.398093][ T9121] RIP: 0033:0x45a919 [ 2291.402387][ T9121] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2291.422994][ T9121] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2291.431412][ T9121] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2291.440163][ T9121] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2291.448364][ T9121] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2291.456470][ T9121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2291.464445][ T9121] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:13 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0xd], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:13 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000070000000000000000000000000005"}], 0x28}, 0x0) 23:08:13 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xf7ffff7f, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:13 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x6]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:14 executing program 4 (fault-call:0 fault-nth:29): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:14 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x7]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:14 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000090000000000000000000000000005"}], 0x28}, 0x0) 23:08:14 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0xff000000, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:14 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0xe], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2291.974676][ T9152] FAULT_INJECTION: forcing a failure. [ 2291.974676][ T9152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:14 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000a0000000000000000000000000005"}], 0x28}, 0x0) 23:08:14 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x17}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2292.099552][ T9152] CPU: 1 PID: 9152 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2292.108194][ T9152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.118439][ T9152] Call Trace: [ 2292.121831][ T9152] dump_stack+0x197/0x210 [ 2292.126169][ T9152] should_fail.cold+0xa/0x15 [ 2292.126187][ T9152] ? fault_create_debugfs_attr+0x180/0x180 [ 2292.126204][ T9152] ? ___might_sleep+0x163/0x2c0 [ 2292.126230][ T9152] should_fail_alloc_page+0x50/0x60 [ 2292.126248][ T9152] __alloc_pages_nodemask+0x1a1/0x910 [ 2292.152083][ T9152] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2292.158631][ T9152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2292.164898][ T9152] ? find_next_bit+0x107/0x130 [ 2292.169726][ T9152] pcpu_populate_chunk+0xf8/0x940 [ 2292.175213][ T9152] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2292.180963][ T9152] ? find_next_bit+0xc7/0x130 [ 2292.185693][ T9152] pcpu_alloc+0xd5b/0x1380 [ 2292.190150][ T9152] ? pcpu_alloc_area+0x820/0x820 [ 2292.195151][ T9152] __alloc_percpu_gfp+0x28/0x30 [ 2292.201158][ T9152] array_map_alloc+0x698/0x7d0 [ 2292.205959][ T9152] ? array_of_map_free+0x50/0x50 [ 2292.210933][ T9152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2292.217192][ T9152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.224670][ T9152] ? array_of_map_free+0x50/0x50 [ 2292.229715][ T9152] __do_sys_bpf+0x478/0x3610 [ 2292.234502][ T9152] ? bpf_prog_load+0x1960/0x1960 [ 2292.234518][ T9152] ? __kasan_check_write+0x14/0x20 [ 2292.234533][ T9152] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2292.234549][ T9152] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2292.234570][ T9152] ? wait_for_completion+0x440/0x440 [ 2292.261674][ T9152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2292.268133][ T9152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2292.273624][ T9152] ? do_syscall_64+0x26/0x790 [ 2292.284673][ T9152] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.290764][ T9152] ? do_syscall_64+0x26/0x790 [ 2292.295468][ T9152] __x64_sys_bpf+0x73/0xb0 [ 2292.299920][ T9152] do_syscall_64+0xfa/0x790 [ 2292.304457][ T9152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.310367][ T9152] RIP: 0033:0x45a919 [ 2292.314279][ T9152] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.337143][ T9152] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2292.345574][ T9152] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2292.353561][ T9152] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2292.361544][ T9152] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2292.369524][ T9152] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2292.377593][ T9152] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000480)='cpuacct.usage_user\x00', 0x0, 0x0) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000440)={r2, r4}) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x1b}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00b80b0000000000000000000000000005"}], 0x28}, 0x0) 23:08:15 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x8]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:15 executing program 4 (fault-call:0 fault-nth:30): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:15 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0xf], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00000e0000000000000000000000000005"}], 0x28}, 0x0) 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2292.703220][ T9184] FAULT_INJECTION: forcing a failure. [ 2292.703220][ T9184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2292.735607][ T9184] CPU: 1 PID: 9184 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2292.744251][ T9184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.754327][ T9184] Call Trace: [ 2292.757748][ T9184] dump_stack+0x197/0x210 [ 2292.762334][ T9184] should_fail.cold+0xa/0x15 [ 2292.767490][ T9184] ? fault_create_debugfs_attr+0x180/0x180 [ 2292.773442][ T9184] ? ___might_sleep+0x163/0x2c0 [ 2292.778494][ T9184] should_fail_alloc_page+0x50/0x60 [ 2292.783899][ T9184] __alloc_pages_nodemask+0x1a1/0x910 [ 2292.789291][ T9184] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2292.795330][ T9184] ? __alloc_pages_slowpath+0x2920/0x2920 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000110000000000000000000000000005"}], 0x28}, 0x0) [ 2292.801189][ T9184] ? kasan_unpoison_shadow+0x35/0x50 [ 2292.806700][ T9184] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2292.812978][ T9184] alloc_pages_current+0x107/0x210 [ 2292.818216][ T9184] __vmalloc_node_range+0x4f8/0x810 [ 2292.823446][ T9184] __vmalloc+0x44/0x50 [ 2292.827822][ T9184] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2292.832609][ T9184] pcpu_mem_zalloc+0x8a/0xf0 [ 2292.837400][ T9184] pcpu_create_chunk+0x196/0x7f0 [ 2292.842450][ T9184] pcpu_alloc+0x10f3/0x1380 [ 2292.847072][ T9184] ? pcpu_alloc_area+0x820/0x820 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x2]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2292.852054][ T9184] __alloc_percpu_gfp+0x28/0x30 [ 2292.856928][ T9184] array_map_alloc+0x698/0x7d0 [ 2292.862013][ T9184] ? array_of_map_free+0x50/0x50 [ 2292.866977][ T9184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2292.873359][ T9184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2292.879650][ T9184] ? array_of_map_free+0x50/0x50 [ 2292.884614][ T9184] __do_sys_bpf+0x478/0x3610 [ 2292.889236][ T9184] ? bpf_prog_load+0x1960/0x1960 [ 2292.894280][ T9184] ? __kasan_check_write+0x14/0x20 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000200000000000000000000000000005"}], 0x28}, 0x0) 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x3]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2292.899409][ T9184] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2292.904976][ T9184] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2292.910382][ T9184] ? wait_for_completion+0x440/0x440 [ 2292.915716][ T9184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2292.922356][ T9184] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2292.927845][ T9184] ? do_syscall_64+0x26/0x790 [ 2292.932551][ T9184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.940830][ T9184] ? do_syscall_64+0x26/0x790 [ 2292.945536][ T9184] __x64_sys_bpf+0x73/0xb0 [ 2292.950060][ T9184] do_syscall_64+0xfa/0x790 [ 2292.954591][ T9184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2292.960502][ T9184] RIP: 0033:0x45a919 [ 2292.964421][ T9184] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.984039][ T9184] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2292.992468][ T9184] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2293.000457][ T9184] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2293.008450][ T9184] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2293.017224][ T9184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2293.025214][ T9184] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100)=r0, 0xa6) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00003f0000000000000000000000000005"}], 0x28}, 0x0) 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x4]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:15 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x48]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:15 executing program 4 (fault-call:0 fault-nth:31): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:15 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x10], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000400000000000000000000000000005"}], 0x28}, 0x0) 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x5]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:15 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x4c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2293.337462][ T9219] FAULT_INJECTION: forcing a failure. [ 2293.337462][ T9219] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2293.392910][ T9219] CPU: 0 PID: 9219 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2293.401776][ T9219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.411843][ T9219] Call Trace: [ 2293.415199][ T9219] dump_stack+0x197/0x210 [ 2293.420172][ T9219] should_fail.cold+0xa/0x15 [ 2293.424979][ T9219] ? fault_create_debugfs_attr+0x180/0x180 [ 2293.431443][ T9219] ? ___might_sleep+0x163/0x2c0 [ 2293.436636][ T9219] should_fail_alloc_page+0x50/0x60 [ 2293.443434][ T9219] __alloc_pages_nodemask+0x1a1/0x910 [ 2293.449456][ T9219] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2293.455857][ T9219] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2293.462472][ T9219] ? find_next_bit+0x107/0x130 [ 2293.467440][ T9219] pcpu_populate_chunk+0xf8/0x940 [ 2293.472579][ T9219] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2293.478321][ T9219] ? find_next_bit+0xc7/0x130 [ 2293.483041][ T9219] pcpu_alloc+0xd5b/0x1380 [ 2293.487701][ T9219] ? pcpu_alloc_area+0x820/0x820 [ 2293.492679][ T9219] __alloc_percpu_gfp+0x28/0x30 [ 2293.497556][ T9219] array_map_alloc+0x698/0x7d0 [ 2293.502360][ T9219] ? array_of_map_free+0x50/0x50 [ 2293.507934][ T9219] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2293.514293][ T9219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2293.520907][ T9219] ? array_of_map_free+0x50/0x50 [ 2293.525973][ T9219] __do_sys_bpf+0x478/0x3610 [ 2293.530782][ T9219] ? bpf_prog_load+0x1960/0x1960 [ 2293.535832][ T9219] ? __kasan_check_write+0x14/0x20 23:08:15 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000480000000000000000000000000005"}], 0x28}, 0x0) 23:08:15 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x6]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2293.541214][ T9219] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2293.546793][ T9219] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2293.552287][ T9219] ? wait_for_completion+0x440/0x440 [ 2293.557628][ T9219] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2293.564113][ T9219] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2293.569962][ T9219] ? do_syscall_64+0x26/0x790 [ 2293.574878][ T9219] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2293.581502][ T9219] ? do_syscall_64+0x26/0x790 [ 2293.586350][ T9219] __x64_sys_bpf+0x73/0xb0 [ 2293.591066][ T9219] do_syscall_64+0xfa/0x790 [ 2293.595945][ T9219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2293.602457][ T9219] RIP: 0033:0x45a919 [ 2293.606458][ T9219] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2293.606466][ T9219] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2293.606479][ T9219] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:16 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00004c0000000000000000000000000005"}], 0x28}, 0x0) [ 2293.606487][ T9219] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2293.606495][ T9219] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2293.606502][ T9219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2293.606510][ T9219] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="c102000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a008fa0726400850000000d000000b968e6b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r4, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r6, &(0x7f0000001cc0), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x7fffffff) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000300)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:16 executing program 4 (fault-call:0 fault-nth:32): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:16 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000600000000000000000000000000005"}], 0x28}, 0x0) 23:08:16 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x68]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:16 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x11], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:16 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x7]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2293.845020][ T9247] FAULT_INJECTION: forcing a failure. [ 2293.845020][ T9247] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2293.952185][ T9247] CPU: 0 PID: 9247 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2293.961275][ T9247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.974307][ T9247] Call Trace: [ 2293.977626][ T9247] dump_stack+0x197/0x210 [ 2293.982709][ T9247] should_fail.cold+0xa/0x15 [ 2293.987347][ T9247] ? fault_create_debugfs_attr+0x180/0x180 [ 2293.993673][ T9247] ? ___might_sleep+0x163/0x2c0 [ 2293.998660][ T9247] should_fail_alloc_page+0x50/0x60 [ 2294.004005][ T9247] __alloc_pages_nodemask+0x1a1/0x910 [ 2294.009408][ T9247] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2294.015260][ T9247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2294.022652][ T9247] ? find_next_bit+0x107/0x130 [ 2294.028233][ T9247] pcpu_populate_chunk+0xf8/0x940 [ 2294.033316][ T9247] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2294.039073][ T9247] ? find_next_bit+0xc7/0x130 [ 2294.043792][ T9247] pcpu_alloc+0xd5b/0x1380 [ 2294.048250][ T9247] ? pcpu_alloc_area+0x820/0x820 [ 2294.053229][ T9247] __alloc_percpu_gfp+0x28/0x30 [ 2294.058167][ T9247] array_map_alloc+0x698/0x7d0 [ 2294.062953][ T9247] ? array_of_map_free+0x50/0x50 [ 2294.067920][ T9247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2294.074786][ T9247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2294.081048][ T9247] ? array_of_map_free+0x50/0x50 [ 2294.086008][ T9247] __do_sys_bpf+0x478/0x3610 [ 2294.090626][ T9247] ? bpf_prog_load+0x1960/0x1960 [ 2294.095583][ T9247] ? __kasan_check_write+0x14/0x20 [ 2294.100711][ T9247] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2294.106259][ T9247] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2294.106279][ T9247] ? wait_for_completion+0x440/0x440 [ 2294.106301][ T9247] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2294.106328][ T9247] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2294.106343][ T9247] ? do_syscall_64+0x26/0x790 [ 2294.106359][ T9247] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.106379][ T9247] ? do_syscall_64+0x26/0x790 [ 2294.128736][ T9247] __x64_sys_bpf+0x73/0xb0 23:08:16 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x8]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:16 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000680000000000000000000000000005"}], 0x28}, 0x0) 23:08:16 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x6c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2294.128756][ T9247] do_syscall_64+0xfa/0x790 [ 2294.128780][ T9247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.161094][ T9247] RIP: 0033:0x45a919 [ 2294.165185][ T9247] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2294.184914][ T9247] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2294.184930][ T9247] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:16 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x74]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2294.184938][ T9247] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2294.184946][ T9247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2294.184956][ T9247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2294.184964][ T9247] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:16 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x7a]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:16 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00006c0000000000000000000000000005"}], 0x28}, 0x0) 23:08:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000080000000205000000f0ff00000000b7060000000000002d64050000000000750404000500b86126b1776af6cb7d1cdb037c5c00eb6b22af6d7771e85c000404000001007d60b70300000000000008000d000000b7000000000000000000ff6758f2da4a00a79c7054e285050406a2d33397af066d1994bc2084443bac99f25f06788d5c34396a9f2467b7bd5d9c30448500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:17 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x48]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:17 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:17 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000740000000000000000000000000005"}], 0x28}, 0x0) 23:08:17 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x12], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:17 executing program 4 (fault-call:0 fault-nth:33): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:17 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x2]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2294.704671][ T9290] FAULT_INJECTION: forcing a failure. [ 2294.704671][ T9290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:17 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x4c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2294.760989][ T9290] CPU: 1 PID: 9290 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2294.769701][ T9290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2294.780890][ T9290] Call Trace: [ 2294.784326][ T9290] dump_stack+0x197/0x210 [ 2294.788723][ T9290] should_fail.cold+0xa/0x15 [ 2294.793449][ T9290] ? fault_create_debugfs_attr+0x180/0x180 [ 2294.799539][ T9290] ? ___might_sleep+0x163/0x2c0 [ 2294.804519][ T9290] should_fail_alloc_page+0x50/0x60 [ 2294.810510][ T9290] __alloc_pages_nodemask+0x1a1/0x910 [ 2294.815883][ T9290] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2294.815906][ T9290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2294.815920][ T9290] ? find_next_bit+0x107/0x130 [ 2294.815940][ T9290] pcpu_populate_chunk+0xf8/0x940 [ 2294.815952][ T9290] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2294.815970][ T9290] ? find_next_bit+0xc7/0x130 [ 2294.848392][ T9290] pcpu_alloc+0xd5b/0x1380 [ 2294.852854][ T9290] ? pcpu_alloc_area+0x820/0x820 [ 2294.857827][ T9290] __alloc_percpu_gfp+0x28/0x30 [ 2294.862707][ T9290] array_map_alloc+0x698/0x7d0 [ 2294.867496][ T9290] ? array_of_map_free+0x50/0x50 [ 2294.872457][ T9290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2294.878719][ T9290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2294.884992][ T9290] ? array_of_map_free+0x50/0x50 [ 2294.889950][ T9290] __do_sys_bpf+0x478/0x3610 [ 2294.894574][ T9290] ? bpf_prog_load+0x1960/0x1960 [ 2294.899536][ T9290] ? __kasan_check_write+0x14/0x20 [ 2294.904668][ T9290] ? __mutex_unlock_slowpath+0xf0/0x6a0 23:08:17 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x3]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2294.910330][ T9290] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2294.915639][ T9290] ? wait_for_completion+0x440/0x440 [ 2294.921040][ T9290] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2294.927328][ T9290] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2294.933076][ T9290] ? do_syscall_64+0x26/0x790 [ 2294.937846][ T9290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.943924][ T9290] ? do_syscall_64+0x26/0x790 [ 2294.948627][ T9290] __x64_sys_bpf+0x73/0xb0 [ 2294.953076][ T9290] do_syscall_64+0xfa/0x790 23:08:17 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x68]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2294.957613][ T9290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2294.963519][ T9290] RIP: 0033:0x45a919 [ 2294.967615][ T9290] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2294.987376][ T9290] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2294.995790][ T9290] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2294.995799][ T9290] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:17 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00007a0000000000000000000000000005"}], 0x28}, 0x0) [ 2294.995807][ T9290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2294.995815][ T9290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2294.995823][ T9290] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:17 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00fe800000000000000000000000000005"}], 0x28}, 0x0) 23:08:17 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x4]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000300), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)={[{0x2d, 'io'}, {0x2b, 'cpu'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'rdma'}, {0x6, 'memory'}]}, 0x21) 23:08:17 executing program 4 (fault-call:0 fault-nth:34): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:17 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x6c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:17 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x13], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:17 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0005aa0000000000000000000000000005"}], 0x28}, 0x0) 23:08:17 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x5]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:17 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x74]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2295.439082][ T9334] FAULT_INJECTION: forcing a failure. [ 2295.439082][ T9334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2295.516969][ T9334] CPU: 0 PID: 9334 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2295.526142][ T9334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.536222][ T9334] Call Trace: [ 2295.539537][ T9334] dump_stack+0x197/0x210 [ 2295.543888][ T9334] should_fail.cold+0xa/0x15 [ 2295.548603][ T9334] ? fault_create_debugfs_attr+0x180/0x180 [ 2295.554617][ T9334] ? ___might_sleep+0x163/0x2c0 [ 2295.559499][ T9334] should_fail_alloc_page+0x50/0x60 [ 2295.564892][ T9334] __alloc_pages_nodemask+0x1a1/0x910 [ 2295.570299][ T9334] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2295.576058][ T9334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2295.582315][ T9334] ? find_next_bit+0x107/0x130 [ 2295.587282][ T9334] pcpu_populate_chunk+0xf8/0x940 [ 2295.592758][ T9334] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2295.598600][ T9334] ? find_next_bit+0xc7/0x130 [ 2295.603308][ T9334] pcpu_alloc+0xd5b/0x1380 [ 2295.607755][ T9334] ? pcpu_alloc_area+0x820/0x820 [ 2295.613246][ T9334] __alloc_percpu_gfp+0x28/0x30 [ 2295.613263][ T9334] array_map_alloc+0x698/0x7d0 [ 2295.613282][ T9334] ? array_of_map_free+0x50/0x50 [ 2295.613302][ T9334] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2295.613318][ T9334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2295.613334][ T9334] ? array_of_map_free+0x50/0x50 [ 2295.613351][ T9334] __do_sys_bpf+0x478/0x3610 [ 2295.613372][ T9334] ? bpf_prog_load+0x1960/0x1960 [ 2295.650611][ T9334] ? __kasan_check_write+0x14/0x20 [ 2295.650636][ T9334] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2295.675512][ T9334] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2295.680814][ T9334] ? wait_for_completion+0x440/0x440 [ 2295.680846][ T9334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2295.692368][ T9334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2295.697857][ T9334] ? do_syscall_64+0x26/0x790 [ 2295.702565][ T9334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.708681][ T9334] ? do_syscall_64+0x26/0x790 [ 2295.713390][ T9334] __x64_sys_bpf+0x73/0xb0 23:08:18 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "000bb80000000000000000000000000005"}], 0x28}, 0x0) 23:08:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000005c0), 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000980)='vmnet1@\x1aI\xde/cPk\xbf+\x8c\x9f\x8a\xf1\x92\xf2J\xedRy\x9a$\xb7U\xf3\t\v\x91s\xf9\r\xfa\xbd\b\xdc#\xf6\xe3\x14%,\xea\x12{L\xec\xc7\xbe09nv\xd32\x1f\xbc\xad\x15\'\xdf\x9b3@\xab\xdc\xd5\x82t\x8e\x9fs5R\xf2\xcb<\xe5\x1a\xd2\xdd\x13_W\xa0V\xe2\xa2\x94\xbc9d\x9c\xb4U\xef\x94(\xc7\xfd%Bs\xe2j\x16\x16s\x15\xef\x9b\xcf\xe55\xb7\xd7IG\xf8\x7f\xc9V\xa3\xbe\xf2&\x04Mh\x1ec\x9f\x0e69\x1b:\xa1S\xf4\x1aIk]+\xcd\xccN\xbd\x8a[-3\xd1\x91\x02ExE\x1b\a\x0e\x81\xf9\xf2! P\xe2)\xbb\xca\x06\x8ft\t\xca\xc4\xe7\xae\x99\xd6\f\x1e\x9d|.\xea\x1c\xe7{\xd6\xebyE^}\x9f-T\x18S\xfc\xa6\xcb\x1e?<\xb3\x18\xbb\xb7\xad\xbd\xf1\xdan', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r4, &(0x7f0000000540)={&(0x7f0000000300)={0x2, 0x4e24, @rand_addr=0x329}, 0x10, &(0x7f0000000500)=[{&(0x7f0000000400)="a5ad6c52f99d78d8fd7b05749ac61eaff502a1fb63bd197d1daa1ea6f4f2fd2c11f9a61df0803e0958f3b04dae0391bea387956ad8d4c7fa02d7619aada0e8795b61c511f2333d9f96884ae182504ea1f3f833f2df0f6fd2cfae5fe60bd718a36a898d94e540122c7db3d9554f0de120ec1c300618972858f7d0619f59f5cdfd472741866073778d68cd3f7abd4b04fcfef22f7d2572523d07bdb3056f9c45083936ba61ad1b02199f1b9db45093a3f963ca567999966d4d242a760a7e8a04c41daef752e3737ea8a21a8483cfd0c403f2f876ead28020c67f5802edb89550f3dca4a4a9be229801df34772d4a16ef11c1f9340d51ad9a", 0xf7}], 0x1}, 0x8800) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz1\x00', 0x1ff) [ 2295.717831][ T9334] do_syscall_64+0xfa/0x790 [ 2295.722370][ T9334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.728378][ T9334] RIP: 0033:0x45a919 [ 2295.732376][ T9334] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2295.752095][ T9334] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 23:08:18 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x14], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:18 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x6]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2295.752111][ T9334] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2295.752119][ T9334] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2295.752126][ T9334] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2295.752133][ T9334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2295.752141][ T9334] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:18 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x7a]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:18 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00fec00000000000000000000000000005"}], 0x28}, 0x0) 23:08:18 executing program 4 (fault-call:0 fault-nth:35): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000077c0)={&(0x7f0000006540)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006780)=[{&(0x7f00000065c0)=""/173, 0xad}, {&(0x7f0000006680)=""/251, 0xfb}], 0x2, &(0x7f00000067c0)=""/4096, 0x1000}, 0x2301) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0xff, 0x7fffffff, 0x1, 0x1, 0x1ff, [], r1, r2, 0x1, 0x2}, 0x3c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x10, &(0x7f0000000600)={&(0x7f00000005c0)=""/55, 0x37, 0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x5, 0x2, &(0x7f0000000300)=@raw=[@call={0x85, 0x0, 0x0, 0x4e}, @jmp={0x5, 0x1, 0x0, 0x5, 0x8, 0xc, 0x24a61034e1fd169a}], &(0x7f0000000400)='syzkaller\x00', 0x1, 0xf5, &(0x7f0000000440)=""/245, 0x40f00, 0x0, [], r1, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0xc, 0x9, 0x5}, 0x10, r3, r0}, 0x78) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r5) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r5, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r4, 0xc, r5, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:18 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x7]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:18 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x15], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:18 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:18 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x8]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:18 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000fc0000000000000000000000000005"}], 0x28}, 0x0) [ 2296.307921][ T9379] FAULT_INJECTION: forcing a failure. [ 2296.307921][ T9379] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2296.373243][ T9379] CPU: 1 PID: 9379 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2296.382229][ T9379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.392298][ T9379] Call Trace: [ 2296.395624][ T9379] dump_stack+0x197/0x210 [ 2296.399983][ T9379] should_fail.cold+0xa/0x15 [ 2296.404629][ T9379] ? fault_create_debugfs_attr+0x180/0x180 [ 2296.410553][ T9379] ? ___might_sleep+0x163/0x2c0 [ 2296.415440][ T9379] should_fail_alloc_page+0x50/0x60 [ 2296.420652][ T9379] __alloc_pages_nodemask+0x1a1/0x910 [ 2296.426233][ T9379] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2296.432002][ T9379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2296.438378][ T9379] ? find_next_bit+0x107/0x130 [ 2296.443186][ T9379] pcpu_populate_chunk+0xf8/0x940 [ 2296.448243][ T9379] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2296.453971][ T9379] ? find_next_bit+0xc7/0x130 [ 2296.458668][ T9379] pcpu_alloc+0xd5b/0x1380 [ 2296.463128][ T9379] ? pcpu_alloc_area+0x820/0x820 [ 2296.472174][ T9379] __alloc_percpu_gfp+0x28/0x30 [ 2296.477037][ T9379] array_map_alloc+0x698/0x7d0 [ 2296.481816][ T9379] ? array_of_map_free+0x50/0x50 [ 2296.486768][ T9379] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2296.493023][ T9379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2296.499279][ T9379] ? array_of_map_free+0x50/0x50 [ 2296.504226][ T9379] __do_sys_bpf+0x478/0x3610 [ 2296.508920][ T9379] ? bpf_prog_load+0x1960/0x1960 [ 2296.513872][ T9379] ? __kasan_check_write+0x14/0x20 [ 2296.518992][ T9379] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2296.524552][ T9379] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2296.529942][ T9379] ? wait_for_completion+0x440/0x440 [ 2296.535502][ T9379] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2296.542468][ T9379] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2296.548998][ T9379] ? do_syscall_64+0x26/0x790 [ 2296.553714][ T9379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2296.559954][ T9379] ? do_syscall_64+0x26/0x790 [ 2296.564655][ T9379] __x64_sys_bpf+0x73/0xb0 [ 2296.569099][ T9379] do_syscall_64+0xfa/0x790 [ 2296.573619][ T9379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2296.579514][ T9379] RIP: 0033:0x45a919 [ 2296.583417][ T9379] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2296.603036][ T9379] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2296.611484][ T9379] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 23:08:19 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x2]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2296.619473][ T9379] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2296.628680][ T9379] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2296.636667][ T9379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2296.644664][ T9379] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:19 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x16], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:19 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x3]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000003000000bfa30000003f1a206346da907641fc330000000779a4f0ff00000000b7060000ffc82f90436405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000040de9ffffb600000000000000950000000b000000b406fa2a874e9581c8827d7a217ac50df77d3e20b67a0502f60db1d2f4c53d2fbde91b96b4dc89574f91455f0b3fcf8e4b6c14fcf3defc2696a0b196b1438dcfdceb741bbd2255afe81aa53125f7306e843776"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x1000, 0x94, &(0x7f00000007c0)="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", &(0x7f0000000500)=""/148, 0x2, 0x0, 0xa0, 0x99, &(0x7f00000005c0)="421ecaff30ff7588feee97908f77104a6f39fa044d09a399ca3a3338f238f21e0e060d0aa59554e464b693425690cb3691e4b041da2cba1e202b65f550f0eb900c7aa5536f12538cd549e280c823309a75d6fd3ede9a5cab700f9445ffe7f6e5d297dbac9fb94e4b7ab34757a1b2af6c10553fe59809fbd72835f2df04a21fb84fbcd8605f00a082dc0e09152b2ff0c50a544d5fb8c4c71fd6b8c567257b917b", &(0x7f00000017c0)="e310d1c87eb49505b0e4aa96c33bbfdc09b918407a90d9841ece3131df2fea5cac8e447f253bf572be66c45d5d408a3fb174061893b291fb45f825d158808ba6ae9151cdf2285583f4b7e2ba3355d0d76a7909d73e3076a4958e6585b75533119424c78816cd9f6c4484d37662fb9475c4c36ed4574e49e29f7391c3f440418ec4fb0203a26cb8a7f088d01d76d826c3570110e24b1720b857"}, 0x40) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:19 executing program 4 (fault-call:0 fault-nth:36): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:19 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0080fe0000000000000000000000000005"}], 0x28}, 0x0) 23:08:19 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x48]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:19 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x4]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:19 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x17], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) [ 2296.973219][ T9407] FAULT_INJECTION: forcing a failure. [ 2296.973219][ T9407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:19 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x4c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r2) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000400)={0x4, 0x2}, 0xc) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r2, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r1, 0xc, r2, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) 23:08:19 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "00c0fe0000000000000000000000000005"}], 0x28}, 0x0) [ 2297.083144][ T9407] CPU: 1 PID: 9407 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2297.091766][ T9407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.101817][ T9407] Call Trace: [ 2297.105114][ T9407] dump_stack+0x197/0x210 [ 2297.105134][ T9407] should_fail.cold+0xa/0x15 [ 2297.105153][ T9407] ? fault_create_debugfs_attr+0x180/0x180 [ 2297.105168][ T9407] ? ___might_sleep+0x163/0x2c0 [ 2297.105191][ T9407] should_fail_alloc_page+0x50/0x60 [ 2297.105209][ T9407] __alloc_pages_nodemask+0x1a1/0x910 [ 2297.136010][ T9407] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2297.141764][ T9407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2297.148024][ T9407] ? find_next_bit+0x107/0x130 [ 2297.152812][ T9407] pcpu_populate_chunk+0xf8/0x940 [ 2297.152828][ T9407] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2297.152842][ T9407] ? find_next_bit+0xc7/0x130 [ 2297.152869][ T9407] pcpu_alloc+0xd5b/0x1380 [ 2297.173090][ T9407] ? pcpu_alloc_area+0x820/0x820 [ 2297.178089][ T9407] __alloc_percpu_gfp+0x28/0x30 [ 2297.182966][ T9407] array_map_alloc+0x698/0x7d0 [ 2297.187777][ T9407] ? array_of_map_free+0x50/0x50 [ 2297.192746][ T9407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2297.199034][ T9407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.205309][ T9407] ? array_of_map_free+0x50/0x50 [ 2297.210271][ T9407] __do_sys_bpf+0x478/0x3610 [ 2297.214892][ T9407] ? bpf_prog_load+0x1960/0x1960 [ 2297.219862][ T9407] ? __kasan_check_write+0x14/0x20 [ 2297.225000][ T9407] ? __mutex_unlock_slowpath+0xf0/0x6a0 23:08:19 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000ff0000000000000000000000000005"}], 0x28}, 0x0) [ 2297.230566][ T9407] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2297.235882][ T9407] ? wait_for_completion+0x440/0x440 [ 2297.241198][ T9407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2297.247471][ T9407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2297.252951][ T9407] ? do_syscall_64+0x26/0x790 [ 2297.257654][ T9407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.263889][ T9407] ? do_syscall_64+0x26/0x790 [ 2297.268605][ T9407] __x64_sys_bpf+0x73/0xb0 [ 2297.273170][ T9407] do_syscall_64+0xfa/0x790 [ 2297.277705][ T9407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.283628][ T9407] RIP: 0033:0x45a919 [ 2297.283646][ T9407] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2297.283653][ T9407] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2297.283666][ T9407] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2297.283674][ T9407] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 23:08:19 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x68]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2297.283682][ T9407] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2297.283697][ T9407] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2297.307326][ T9407] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:19 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x5]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000eeffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400050000000404000001007d60b7030000000000007a0a00fe00000000850000000d000000e05c465aedd3eab70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x26, 0x29, &(0x7f00000006c0)="b9ff031a000d698cb89e40f02cead5dc57ee41dea43e63a377fb7f11c72be949eb4be1977d48", &(0x7f00000000c0)=""/41, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0xcb, 0x2, 0x7, 0x7f, 0x0, 0x4, 0x2408a, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3f, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x30008, 0x7fff, 0x4, 0x8, 0xfffffffffffffff9, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r1, 0x54076a24712e72ae) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r3) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x5452, &(0x7f0000000040)) write$cgroup_pid(r3, &(0x7f0000001cc0), 0x12) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0xff, 0x7, 0x1, 0x20, 0x0, 0x80000000, 0x20000, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7, 0x200}, 0x109c4, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x9, 0x3}, r2, 0xc, r3, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu//.z1\x8c', 0x1ff) 23:08:19 executing program 4 (fault-call:0 fault-nth:37): bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x48, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:19 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000400300000000000000000000000005"}], 0x28}, 0x0) 23:08:20 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x6]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:20 executing program 0: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100, 0x18], 0x0, 0xffffffffffffffff, 0x1e000}, 0x3c) 23:08:20 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x6c]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) [ 2297.629850][ T9454] FAULT_INJECTION: forcing a failure. [ 2297.629850][ T9454] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2297.715645][ T9454] CPU: 1 PID: 9454 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2297.724292][ T9454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.734357][ T9454] Call Trace: [ 2297.737680][ T9454] dump_stack+0x197/0x210 [ 2297.742034][ T9454] should_fail.cold+0xa/0x15 [ 2297.746649][ T9454] ? fault_create_debugfs_attr+0x180/0x180 [ 2297.752565][ T9454] ? ___might_sleep+0x163/0x2c0 [ 2297.757444][ T9454] should_fail_alloc_page+0x50/0x60 [ 2297.763096][ T9454] __alloc_pages_nodemask+0x1a1/0x910 [ 2297.768496][ T9454] ? find_held_lock+0x35/0x130 [ 2297.773279][ T9454] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2297.779028][ T9454] ? lock_downgrade+0x920/0x920 [ 2297.779043][ T9454] ? rwlock_bug.part.0+0x90/0x90 [ 2297.779065][ T9454] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2297.795053][ T9454] alloc_pages_current+0x107/0x210 [ 2297.795076][ T9454] __get_free_pages+0xc/0x40 [ 2297.795092][ T9454] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2297.795112][ T9454] apply_to_page_range+0x445/0x700 [ 2297.795134][ T9454] ? memset+0x40/0x40 [ 2297.820217][ T9454] kasan_populate_vmalloc+0x68/0x90 [ 2297.825517][ T9454] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 2297.830619][ T9454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.836870][ T9454] pcpu_create_chunk+0x24e/0x7f0 [ 2297.841806][ T9454] pcpu_alloc+0x10f3/0x1380 [ 2297.846304][ T9454] ? pcpu_alloc_area+0x820/0x820 [ 2297.851234][ T9454] __alloc_percpu_gfp+0x28/0x30 [ 2297.856074][ T9454] array_map_alloc+0x698/0x7d0 [ 2297.860826][ T9454] ? array_of_map_free+0x50/0x50 [ 2297.865751][ T9454] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2297.872066][ T9454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.878304][ T9454] ? array_of_map_free+0x50/0x50 [ 2297.883238][ T9454] __do_sys_bpf+0x478/0x3610 [ 2297.887824][ T9454] ? bpf_prog_load+0x1960/0x1960 [ 2297.892760][ T9454] ? __kasan_check_write+0x14/0x20 [ 2297.897873][ T9454] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2297.903838][ T9454] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2297.909200][ T9454] ? wait_for_completion+0x440/0x440 [ 2297.914494][ T9454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2297.920730][ T9454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2297.927661][ T9454] ? do_syscall_64+0x26/0x790 [ 2297.932348][ T9454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.938425][ T9454] ? do_syscall_64+0x26/0x790 [ 2297.943101][ T9454] __x64_sys_bpf+0x73/0xb0 [ 2297.947510][ T9454] do_syscall_64+0xfa/0x790 [ 2297.952013][ T9454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.958058][ T9454] RIP: 0033:0x45a919 [ 2297.961944][ T9454] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2297.981529][ T9454] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2297.989935][ T9454] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2297.997891][ T9454] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2298.005856][ T9454] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2298.013828][ T9454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2298.021783][ T9454] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 23:08:20 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000000400000000000000000000000005"}], 0x28}, 0x0) [ 2298.170327][ T9454] ================================================================== [ 2298.178797][ T9454] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 2298.186357][ T9454] Write of size 32768 at addr ffffe8ffff600000 by task syz-executor.4/9454 [ 2298.194946][ T9454] [ 2298.197290][ T9454] CPU: 0 PID: 9454 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2298.205888][ T9454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.215955][ T9454] Call Trace: [ 2298.219270][ T9454] dump_stack+0x197/0x210 [ 2298.223615][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.228235][ T9454] print_address_description.constprop.0.cold+0x5/0x30b [ 2298.235197][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.239936][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.244579][ T9454] __kasan_report.cold+0x1b/0x41 [ 2298.249547][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.254165][ T9454] kasan_report+0x12/0x20 [ 2298.258506][ T9454] check_memory_region+0x134/0x1a0 [ 2298.263647][ T9454] memset+0x24/0x40 [ 2298.268437][ T9454] pcpu_alloc+0x589/0x1380 [ 2298.272901][ T9454] ? pcpu_alloc_area+0x820/0x820 [ 2298.278046][ T9454] __alloc_percpu_gfp+0x28/0x30 [ 2298.282918][ T9454] array_map_alloc+0x698/0x7d0 [ 2298.287712][ T9454] ? array_of_map_free+0x50/0x50 [ 2298.292677][ T9454] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2298.299042][ T9454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2298.305307][ T9454] ? array_of_map_free+0x50/0x50 [ 2298.310278][ T9454] __do_sys_bpf+0x478/0x3610 [ 2298.314898][ T9454] ? bpf_prog_load+0x1960/0x1960 [ 2298.319966][ T9454] ? __kasan_check_write+0x14/0x20 [ 2298.325094][ T9454] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2298.330650][ T9454] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2298.335952][ T9454] ? wait_for_completion+0x440/0x440 [ 2298.341259][ T9454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2298.347528][ T9454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2298.353005][ T9454] ? do_syscall_64+0x26/0x790 [ 2298.358169][ T9454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.364251][ T9454] ? do_syscall_64+0x26/0x790 [ 2298.368946][ T9454] __x64_sys_bpf+0x73/0xb0 [ 2298.373386][ T9454] do_syscall_64+0xfa/0x790 [ 2298.377962][ T9454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.384134][ T9454] RIP: 0033:0x45a919 [ 2298.388042][ T9454] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2298.394495][ T4087] kobject: 'loop3' (000000003cdbacde): kobject_uevent_env [ 2298.407661][ T9454] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2298.407687][ T9454] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2298.407695][ T9454] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2298.407702][ T9454] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2298.407710][ T9454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2298.407718][ T9454] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 [ 2298.407738][ T9454] [ 2298.407742][ T9454] [ 2298.407746][ T9454] Memory state around the buggy address: [ 2298.407777][ T9454] BUG: unable to handle page fault for address: fffff91fffebffe0 [ 2298.407785][ T9454] #PF: supervisor read access in kernel mode [ 2298.407791][ T9454] #PF: error_code(0x0000) - not-present page [ 2298.407795][ T9454] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 2298.460814][ T4087] kobject: 'loop3' (000000003cdbacde): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2298.466182][ T9454] Oops: 0000 [#1] PREEMPT SMP KASAN 23:08:20 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x74]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:20 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x7]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) 23:08:20 executing program 2: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x28, 0x29, 0x2, "0000001000000000000000000000000005"}], 0x28}, 0x0) 23:08:20 executing program 3: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x7a]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x43}], 0x10}, 0x0) 23:08:20 executing program 5: r0 = socket$kcm(0xa, 0x8000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000000)=@in6={0xa, 0x4e22, 0x0, @remote={0xfe, 0x80, [0x0, 0x8]}}, 0x80, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x29, 0x8}], 0x10}, 0x0) [ 2298.466197][ T9454] CPU: 0 PID: 9454 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 2298.466204][ T9454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.466224][ T9454] RIP: 0010:memcpy_erms+0x6/0x10 [ 2298.466238][ T9454] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 2298.466245][ T9454] RSP: 0018:ffffc90001567990 EFLAGS: 00010082 [ 2298.466256][ T9454] RAX: ffffc9000156799c RBX: fffff91fffebffe0 RCX: 0000000000000010 [ 2298.466264][ T9454] RDX: 0000000000000010 RSI: fffff91fffebffe0 RDI: ffffc9000156799c [ 2298.466271][ T9454] RBP: ffffc900015679f0 R08: ffff88806853c140 R09: fffff520002acf38 [ 2298.466278][ T9454] R10: fffff520002acf37 R11: ffffc900015679be R12: fffff91fffec0000 [ 2298.466286][ T9454] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 2298.466298][ T9454] FS: 00007eff93b2d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2298.466305][ T9454] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2298.466312][ T9454] CR2: fffff91fffebffe0 CR3: 000000009ff20000 CR4: 00000000001406f0 [ 2298.466321][ T9454] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2298.466336][ T9454] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2298.486477][ T4087] kobject: 'loop5' (000000002a42d90d): kobject_uevent_env [ 2298.490380][ T9454] Call Trace: [ 2298.525150][ T4087] kobject: 'loop5' (000000002a42d90d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2298.527958][ T9454] ? print_shadow_for_address+0x91/0x117 [ 2298.527970][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.527989][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.542117][ T4087] kobject: 'loop2' (00000000eab68ec6): kobject_uevent_env [ 2298.543000][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.543011][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.543025][ T9454] __kasan_report.cold+0x30/0x41 [ 2298.543037][ T9454] ? pcpu_alloc+0x589/0x1380 [ 2298.543050][ T9454] kasan_report+0x12/0x20 [ 2298.543064][ T9454] check_memory_region+0x134/0x1a0 [ 2298.543076][ T9454] memset+0x24/0x40 [ 2298.543095][ T9454] pcpu_alloc+0x589/0x1380 [ 2298.567841][ T4087] kobject: 'loop2' (00000000eab68ec6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2298.570089][ T9454] ? pcpu_alloc_area+0x820/0x820 [ 2298.570109][ T9454] __alloc_percpu_gfp+0x28/0x30 [ 2298.581855][ T4087] kobject: 'loop3' (000000003cdbacde): kobject_uevent_env [ 2298.587193][ T9454] array_map_alloc+0x698/0x7d0 [ 2298.587209][ T9454] ? array_of_map_free+0x50/0x50 [ 2298.587226][ T9454] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2298.587239][ T9454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2298.587252][ T9454] ? array_of_map_free+0x50/0x50 [ 2298.587272][ T9454] __do_sys_bpf+0x478/0x3610 [ 2298.587287][ T9454] ? bpf_prog_load+0x1960/0x1960 [ 2298.587301][ T9454] ? __kasan_check_write+0x14/0x20 [ 2298.587316][ T9454] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2298.587329][ T9454] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2298.587350][ T9454] ? wait_for_completion+0x440/0x440 [ 2298.598410][ T4087] kobject: 'loop3' (000000003cdbacde): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2298.603848][ T9454] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2298.603869][ T9454] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2298.603889][ T9454] ? do_syscall_64+0x26/0x790 [ 2298.603905][ T9454] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.603956][ T9454] ? do_syscall_64+0x26/0x790 [ 2298.616170][ T4087] kobject: 'loop5' (000000002a42d90d): kobject_uevent_env [ 2298.620846][ T9454] __x64_sys_bpf+0x73/0xb0 [ 2298.627647][ T4087] kobject: 'loop5' (000000002a42d90d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2298.635468][ T9454] do_syscall_64+0xfa/0x790 [ 2298.635486][ T9454] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2298.635496][ T9454] RIP: 0033:0x45a919 [ 2298.635512][ T9454] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2298.635518][ T9454] RSP: 002b:00007eff93b2cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2298.635531][ T9454] RAX: ffffffffffffffda RBX: 00007eff93b2cc90 RCX: 000000000045a919 [ 2298.635539][ T9454] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2298.635547][ T9454] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2298.635554][ T9454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff93b2d6d4 [ 2298.635560][ T9454] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000003 [ 2298.635570][ T9454] Modules linked in: [ 2298.647555][ T4087] kobject: 'loop2' (00000000eab68ec6): kobject_uevent_env [ 2298.651502][ T9454] CR2: fffff91fffebffe0 [ 2298.651523][ T9454] ---[ end trace 04f677cef22882c0 ]--- [ 2298.658874][ T4087] kobject: 'loop2' (00000000eab68ec6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2298.661916][ T9454] RIP: 0010:memcpy_erms+0x6/0x10 [ 2298.661936][ T9454] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 2298.676587][ T4087] kobject: 'loop5' (000000002a42d90d): kobject_uevent_env [ 2298.678119][ T9454] RSP: 0018:ffffc90001567990 EFLAGS: 00010082 [ 2298.678130][ T9454] RAX: ffffc9000156799c RBX: fffff91fffebffe0 RCX: 0000000000000010 [ 2298.678145][ T9454] RDX: 0000000000000010 RSI: fffff91fffebffe0 RDI: ffffc9000156799c [ 2298.685029][ T4087] kobject: 'loop5' (000000002a42d90d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2298.687336][ T9454] RBP: ffffc900015679f0 R08: ffff88806853c140 R09: fffff520002acf38 [ 2298.699479][ T4087] kobject: 'loop3' (000000003cdbacde): kobject_uevent_env [ 2298.699816][ T9454] R10: fffff520002acf37 R11: ffffc900015679be R12: fffff91fffec0000 [ 2298.704862][ T4087] kobject: 'loop3' (000000003cdbacde): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2298.709928][ T9454] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 2298.709940][ T9454] FS: 00007eff93b2d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2298.709946][ T9454] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2298.709953][ T9454] CR2: fffff91fffebffe0 CR3: 000000009ff20000 CR4: 00000000001406f0 [ 2298.709963][ T9454] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2298.709970][ T9454] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2298.709986][ T9454] Kernel panic - not syncing: Fatal exception [ 2298.975604][ T9484] BUG: unable to handle page fault for address: fffff91fffec1000 [ 2299.154278][ T9484] #PF: supervisor read access in kernel mode [ 2299.160252][ T9484] #PF: error_code(0x0000) - not-present page [ 2299.166222][ T9484] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 2299.173689][ T9484] Oops: 0000 [#2] PREEMPT SMP KASAN [ 2299.180866][ T9484] CPU: 1 PID: 9484 Comm: syz-executor.0 Tainted: G D 5.5.0-rc1-syzkaller #0 [ 2299.190833][ T9484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.200984][ T9484] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 2299.206788][ T9484] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 2299.226377][ T9484] RSP: 0018:ffffc90001327a80 EFLAGS: 00010216 [ 2299.232543][ T9484] RAX: fffff91fffec1000 RBX: fffff91fffec2000 RCX: ffffffff819e5ed9 [ 2299.240509][ T9484] RDX: 0000000000000001 RSI: 0000000000008000 RDI: ffffe8ffff608000 [ 2299.248594][ T9484] RBP: ffffc90001327a98 R08: fffff91fffec2000 R09: 0000000000001000 [ 2299.256564][ T9484] R10: fffff91fffec1fff R11: ffffe8ffff60ffff R12: fffff91fffec1000 [ 2299.264552][ T9484] R13: 0000000000008000 R14: 0000000000000000 R15: ffff88821fffd100 [ 2299.273647][ T9484] FS: 00007f83a2cb5700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2299.282559][ T9484] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2299.289128][ T9484] CR2: fffff91fffec1000 CR3: 0000000099963000 CR4: 00000000001406e0 [ 2299.297087][ T9484] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2299.305057][ T9484] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2299.313100][ T9484] Call Trace: [ 2299.316382][ T9484] memset+0x24/0x40 [ 2299.320327][ T9484] pcpu_alloc+0x589/0x1380 [ 2299.324841][ T9484] ? pcpu_alloc_area+0x820/0x820 [ 2299.329775][ T9484] ? kasan_kmalloc+0x9/0x10 [ 2299.334355][ T9484] ? __kmalloc_node+0x4e/0x70 [ 2299.339136][ T9484] __alloc_percpu_gfp+0x28/0x30 [ 2299.344084][ T9484] array_map_alloc+0x698/0x7d0 [ 2299.348855][ T9484] ? array_of_map_free+0x50/0x50 [ 2299.353792][ T9484] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2299.360059][ T9484] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2299.366318][ T9484] ? array_of_map_free+0x50/0x50 [ 2299.371271][ T9484] __do_sys_bpf+0x478/0x3610 [ 2299.375858][ T9484] ? bpf_prog_load+0x1960/0x1960 [ 2299.380930][ T9484] ? __kasan_check_read+0x11/0x20 [ 2299.385965][ T9484] ? _copy_to_user+0x118/0x160 [ 2299.390738][ T9484] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2299.396974][ T9484] ? put_timespec64+0xda/0x140 [ 2299.401783][ T9484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2299.407256][ T9484] ? do_syscall_64+0x26/0x790 [ 2299.411938][ T9484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2299.418116][ T9484] ? do_syscall_64+0x26/0x790 [ 2299.422792][ T9484] __x64_sys_bpf+0x73/0xb0 [ 2299.427214][ T9484] do_syscall_64+0xfa/0x790 [ 2299.431732][ T9484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2299.437627][ T9484] RIP: 0033:0x45a919 [ 2299.444313][ T9484] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2299.464212][ T9484] RSP: 002b:00007f83a2cb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2299.472632][ T9484] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 2299.480834][ T9484] RDX: 000000000000003c RSI: 0000000020000080 RDI: 0c00000000000000 [ 2299.488810][ T9484] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2299.496774][ T9484] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83a2cb56d4 [ 2299.504847][ T9484] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 00000000ffffffff [ 2299.512821][ T9484] Modules linked in: [ 2299.516724][ T9484] CR2: fffff91fffec1000 [ 2299.520867][ T9484] ---[ end trace 04f677cef22882c1 ]--- [ 2299.528490][ T9484] RIP: 0010:memcpy_erms+0x6/0x10 [ 2299.533437][ T9484] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 2299.553131][ T9484] RSP: 0018:ffffc90001567990 EFLAGS: 00010082 [ 2299.559388][ T9484] RAX: ffffc9000156799c RBX: fffff91fffebffe0 RCX: 0000000000000010 [ 2299.567479][ T9484] RDX: 0000000000000010 RSI: fffff91fffebffe0 RDI: ffffc9000156799c [ 2299.575554][ T9484] RBP: ffffc900015679f0 R08: ffff88806853c140 R09: fffff520002acf38 [ 2299.583516][ T9484] R10: fffff520002acf37 R11: ffffc900015679be R12: fffff91fffec0000 [ 2299.591596][ T9484] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 2299.600543][ T9484] FS: 00007f83a2cb5700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2299.609645][ T9484] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2299.616323][ T9484] CR2: fffff91fffec1000 CR3: 0000000099963000 CR4: 00000000001406e0 [ 2299.624291][ T9484] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2299.632266][ T9484] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2300.107301][ T9454] Shutting down cpus with NMI [ 2300.113420][ T9454] Kernel Offset: disabled [ 2300.117793][ T9454] Rebooting in 86400 seconds..