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"}, {0x70, 0x115, 0x0, "b90a52fe8fdc9bdcafd62e9176694b1e439f920948bf2c51b8e8536491e66d9a0ae584e7def4ae3e37957bc3c0918dace56cb64c19e911704b001f6938778b2306d81b1b861857dde5b34d542765980b9ee1ec46502320bc160ec9"}, {0x38, 0x88, 0x2, "372cf28942ebd1fd9e88479d7968fd0b75795e27fdadbf3d2eef4cbf2e81340fcf5ee5"}, {0x110, 0x30b, 0x80, "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"}], 0x11c8}, 0x1) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000004180)={&(0x7f0000003c00)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e24, @broadcast}}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000003c80)="bba3943b5fc940850f7bf1788c2ba8755348a14f1670a1dcd1a0a860c7aee76be0bfa5d36d8e0ce721cc0ee210b61975bdeb11957f2d54293927b4d48ac4c3a2790f97f7ca8900dcb73613f2b2d7f608eb096539643c60f42a6559df7a539ee56eb290a1c5c9f6cea43ed366de99f4bd5ac5a5fd0b7d17f70ae9d93d35bd395a52a6f33b9bd1fac6b981", 0x8a}], 0x1, &(0x7f0000003d80)=[{0xa0, 0x88, 0x6, "38fe232002be566c37b9abfef962d1ff997c3dbdc4d842c38bd82e0bb21c9df943798ac7a95d09da8ccb6c45240b94f530b8058f91cb250bbe5aeab563676c846d61867d11bf490e18c4845681a278f0bc1149759731542e732e60aa6746ebf6aec6bb5d84461d364b4d3572a7302ea7e8094b3be0d1dc3889768ca033c4a766baed0d8766f1eb53a622"}, {0xc0, 0x0, 0x200, "8dfe61f414a9658402e036400a978e82b102b87b30f2011d77df5269096a22a253f706c2a980c375a48810789ea767a270f44da4022057048e944a86130dd34fe4995ff5de450e94b39d573e55541a92df12d8c2e65bf94cf48b9e5a003222e29c8cfd386f0516d21ac3aa878538254e565c01e440fa4cfd287051e52019ebbb80afd53b05ed481ce8a3aacbfe925497173504419d5f7c119587e60a1c85070b62aa71f778029a6784822af6"}, {0x108, 0x84, 0x8, "a392041dd1875f3f3feac383d5bc41ccc632a22feafa87dbabe7feca0877302a1cead2772cb0ec15a6ea953efe8bd36b927b62c699a66922b4faba5f7e496760d2c552a11e15bc602909906ec42d2adaba22585ebfdde026c07f8d998262a2f501315f77ee97666ab7ca068c285aebb387c2b342f7fb0ef21a692d0e9a9afe094a04fbb40401f02ad30f18c33deff41991f9e05f35f3e7dbbcbabac55905c84cd31a7bd46a6620650a33089cfee95766884e752eb3532e8af6e685169b952f398f17aed1f9be79370f1c564266661ea536acf153d6aac59b6d8aa0ee6266ddcab63fea8de27e31dd2b485471faa93fa9dd9408"}, {0x78, 0x119, 0xfffffffe, "3313d3942d3d034dbe8e8c2e88788036f31e252ecb0341f1891d96ac217c2ed3b6a39ec6cc1f6da8be601e6f72d7f9132a4dc8152e4c01f4594a1f807660aa44b0dfff88ac1acc29383448bfb8154934accfcd5632b4279c267baa372154f31aaecd52ab"}, {0xf8, 0x114, 0x8, "e1f8e025324c1cad87ed1554c29a021ce12faabd8e33dcdfcf52f2a49b3bcdc3b0b1bfe9c28b68e21526b53bd6c3bf337cc1c83e66e46ba58749b91cb96eae2dd1d6fbb21574feaee8bb35c0172fdc5983002dc897bdbe512d49dd8bd94515f3af34a0be499766e0da7f11a4e7688775a9c4413cdae9b899eb522400e341abeb5f6add42cb37d24b6f0a5b2c33e10439f5d220a7fa71f36934e0cd64edc06a49e5ee57d8c48985e3dde38a8a5dc130401b4e9e1ce8620b75d8165bf6b833c1ffbf866a77ea6b3b13f735a476199773a65e5d9c14561e796155822be75822464a46830ad610b2d539"}], 0x3d8}, 0x10) sendmsg$kcm(r2, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000080)="557efe87a6092ac19f8ec4c0a37072329c8210ca01eeb796d619d3557d73f15928f6534243fafcb82ad65a8e0d242287b74ef178ee329efd3f", 0x39}, {&(0x7f0000000100)="3858d5a6041c1198c9f1e41a8896170c3b3bbe011c38cb5a2066870eeed464ce492cc06ac4524cc5a60591aa16f14334a070dbc76bcf45e68fdd5b682c674e203d77dbe4523f8fd1816b3423a93647869c57e0781daf03e95fb05b0887c101415b0b94448e8c52f3e3ddd125b07ab1cf52406bcc891a0f77b3fade1eae5a98e2d424acfa7def9415edb4d6db7bbe09e650d7b49c3ba4de4618c9ae51088226f8e47e", 0xa2}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000200)="4c698c6f4f1db938ca32351b3e80f029e418843d5458688fefc734aa08b6856fb838577c1c344183aa1f084e57b3cb219372b08a60834b3c4ccaf0b6de17e2f2f3fa7548fe1459656013847c83e03d6cf8a88d9b19d1e5a6040227d811456dc88ce61c21efb29e9c7938554867c3c5a816386dc91ef41de2a9e1297748afd09817f42ea4e1aaafcae85227f9f867", 0x8e}, {&(0x7f0000002340)="0539f6b5387abd7f0431ac95d878732e06feeea835709bbf3142392ab98f443fe6b3e727f3c8e47cf4f4057aecc1b85043470ee1b11f69130a75058c78d96da8a03408827aa41c6d245152daa9cd73c1355d6df416226eef6c7b2a0891a99f93dd5f424c277599e3c10922650c8f184ed307b798e2ac0bfc1311927ee5d352f30bf4314270923d2f94344a1b04a77f923e", 0x91}, {&(0x7f0000002400)="461ef4ebab383a398e3d449a1c5ceae744a75414d409fdd796f4982a849f8e337e734c9dd7d6b9446fe316fa18792ff6e36858692b14a40ce6c686b67b6351a48306a257efd0e366e8feef824f7d2edd976a93d6db4ef8decbb03c74c06732", 0x5f}], 0x7, &(0x7f0000002500)=[{0x108, 0x113, 0x5, "129b2c743850fa8b56fbec1d7e85ec511329eb86d71a2af5bbe432066ab708961bd101307531d593c7e3dbfb2272d54cd88702948c3032294b13d9e2855a533e84b58b18e31bde95a21f81ae9f5ba087fc656993ca40e294976cd643c3f2381f5cb75e21911823f7f4bbc0078526bd12fac56becd42d7547b4e4fb67baeee369c9e3ffa52f6ccd012e0b1521862eee8c71423110c112c870f945bb530be2562a331df7836b997f85a41730911b8e937d6be015ff30e98914d87adebba34df30c42a367161f1ecaf81c90f0003dfd30808688c94cb01b338b9e465324fd0fab9f3bb9b8a90d12f56a8c99d899eb58b727da"}, {0xc0, 0xff, 0x2, "aaed44ae254ac7b663e172db6f7acbc8e8849e39675b9a40cd9db00d10d37fcd5aeb7d94dfae42bc6b7e1e2c1d94f578743344eeb23cc1b3ce12ab0ee8104b9fc0ca890db9a2a6f6b16fda1452c35b89b21e71476c289636c8ae0331bc9b18e84613eca5c0f21aa10d88c0e6c64301aebc37203f1d4b6094922cd755392ee67a96c966a4c5e1ed5fb4b8aa6a3bb95fe729723f26b0d8c5b1c5997fd77734988efaf3d68ec17ac5abb4dd7fed"}, {0xd8, 0x22a, 0x62, "3abb2171dcad2c3c75cacd4b1dfae0eb4abb9cc613fa3b4ac22a1bdd09af0fd6d38ff03c74b7cb39dfed4ac7c0e96258cb7ca2e945b119fec701fea1a2c6d367d62ff2d383c4b2de097330eabcdc003da04317c84db37e4629af7f4ab129bf3aacff7eb6b296527da82606db22b4df6593e1a2f9f83052c6c30dd50efd00fade7663b6946ce01a591e61e9865de1ef164ffd3e4974ecba4b1cc2ee9d0103c9ed34f10f84e3999dcf86c23a592ca9b9976e3265ffcfab78f2bc377e7ccbf9496c66"}], 0x2a0}, 0xc005) 22:45:43 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0xab19be4116898cce, 0x4, 0x83, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:43 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) 22:45:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000001480)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x401, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r6 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r6, 0x0, r5, 0x9) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) openat$cgroup_ro(r10, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:44 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:44 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=0x5, 0x12) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8949, &(0x7f00000001c0)='bond0\x00') write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=r5, @ANYRES16=r3, @ANYRESOCT], @ANYRES32, @ANYRES64=r4, @ANYRESDEC=r2, @ANYRESOCT=r3, @ANYRESOCT=0x0], 0x56) 22:45:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="4a6ca37a7f6da0cee1bde5cd2a0b0ed326880f0ea1a4e2fde9ae426468f06544f624ad59732bd61e8e012057309b4b448e0832f53a2cd4ec4a3ef18002a1c35b673a93079cb113c00cc556dfa439147b11e50ceffd9b88da1b41aa715aabaa936722ea556aac39e16e1b0db429d569bcc5eb1e84906ed5500a5cd48aacbbe41eafafd5b66e51c061b462629643c95c7677b053ec5279baf185cadc4fb3ca7da03c13d75459e191027e706fe5e01a27c24c61b00497ef53042a8903bab73fc596bf7f4e83294371457def1bdeb5ef2014ddfbcb0a5c7ba154785aaa511e712f96f9eb2d3cdc8ff169b69d31c9a04521c5ac3cfe90e134f8685818192d7c433d5c259ec08f5b"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:44 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x2, 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000001480)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:44 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x2, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00021600"], 0xda00) 22:45:44 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:44 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:45 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x4e20, @broadcast}, 0x80, 0x0, 0xffffffffffffffdd}, 0x10008800) 22:45:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:45 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8949, &(0x7f00000001c0)='bond0\x00') write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYRESOCT=0x0, @ANYBLOB="8beb2689991ff719e007831f6ad15b2079e236f92f866ab74a8d4b48c86da61182be69d40c84aa126c20de18ccb10f67564cabf4f7cf55f09e08d9c5088e2f4e695a5903f82208422f9f06ebdf3b3fb2f93a9a0fa09c88dc7c2e9a42772133ddb14bc069ae7dc8846b2bc0e50011f3f24be1e531fa22307e9ef1cbb36470db7d468fcb77d245ae46c274b7732e47aaf24701b3ef88ef50fdd5fb387b76073c33038a82013cead72585f39003c2901becd8e117e8f4fa2b71e11f5b5a4d1162435ed91d0dc4d477b2fea5", @ANYBLOB="2b8d9463eea279de3062872d6533315a67bd1a828493180c1923375568a8ba3f88280833c067f942c27f76f5c19c45cf56d31966ee7fa02674725ea832514696faa1fa2a4d000a82e9b6926338a4ab5932dcdb5d7e9ad07f73797ec9b0e1bb173460fe670f53b6f63f8ee6196814f182bc2b62d7396421bda79a661797d2307051bdc8c43402128afb25998f0f7d958fec8ef53ec568843238ced6ff3bcbd30178e8c1", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYRES64=r2, @ANYRES32, @ANYBLOB="95abf3b5f2f36e5fa6693284c4184f62d236277bee90070712643fb423e890cc9ff11963588d8e4c7d8008e953a93cf83acea882173343223bc7d27ff03cf4333dbe2fdd888a003e2bb30ab0f03dd2eda22042aee16fbce9974d8892c4fe4ca2efa378f74fe5bf9b72f0ff9b03726ece8e6f650df6e33893a4d006ff7d21708a1e3acf804c8d1a28cf6c1b6e529733c219a1482ef3e7068e17b078fb3b1004c422b80c799023ea5c04352c11f9acd890f9107c8e6a1990c366395bb7330e66932b88af1d37cc7284271fbc6cd02e14704d8e73031720d5ef0bdfdf55173fdebc05", @ANYRESHEX=r3], @ANYRES16=r4, @ANYRES16, @ANYRES32=r5], 0x194) 22:45:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfc, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5e6f}, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x2c, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="4a6ca37a7f6da0cee1bde5cd2a0b0ed326880f0ea1a4e2fde9ae426468f06544f624ad59732bd61e8e012057309b4b448e0832f53a2cd4ec4a3ef18002a1c35b673a93079cb113c00cc556dfa439147b11e50ceffd9b88da1b41aa715aabaa936722ea556aac39e16e1b0db429d569bcc5eb1e84906ed5500a5cd48aacbbe41eafafd5b66e51c061b462629643c95c7677b053ec5279baf185cadc4fb3ca7da03c13d75459e191027e706fe5e01a27c24c61b00497ef53042a8903bab73fc596bf7f4e83294371457def1bdeb5ef2014ddfbcb0a5c7ba154785aaa511e712f96f9eb2d3cdc8ff169b69d31c9a04521c5ac3cfe90e134f8685818192d7c433d5c259ec08f5b"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:45 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:45 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0xa, 0x0, 0x3, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0xa}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000001480)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x401, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r6 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r6, 0x0, r5, 0x9) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, r6, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) openat$cgroup_ro(r10, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, 0xffffffffffffffff}}, 0xf) gettid() r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r4) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@un=@file={0x2, './file0\x00'}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0045878, 0x0) openat$cgroup_ro(r7, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:45 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:45 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:45 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='memory.events\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x80000000, 0x81}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000280)='memory.events\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRESOCT=r4, @ANYRESDEC=r5, @ANYRES64=0x0, @ANYRES64=r7]]], 0x5f) 22:45:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:46 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0045878, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuacct.usage\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:46 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000280)="d177e70c63ae6150dc29b1b5fffb162ea67be1a625c10e5fb028ee986a30c9038228bd8231f148de205476e426426543ab84fb470712942cb5209e7547d7034f85abb1315452c1d9f220b6efaddd7abb0567e8b1bd797a5d1bfccfdd51e356ce214cecb96ecbf3b4fecebcd5706e73a01999f97858ffa9e976ab9b8d00a6faff7107d9eed0e5702e7108dccd3880e7797c850dbff626", 0x96}, {&(0x7f0000000180)="8858791d047d0821f97bae5bafb855dab6de241f642b7c00c8a758d0a4ece6280ea96209c86d543ada48d577df34cbaf25f5ede9c48b5de1bc5b0647a3502a33a6948f08090b6fb8583c16ced0c9899ca19d95", 0x53}], 0x2, &(0x7f0000000440)=[{0x30, 0x85, 0x881, "cf90d8a793d6aa0aaa5f9f7f4f1d7268a8dd39e6fcfe6e32dcff2d9764"}, {0x100, 0x1, 0x7fff, "76ddcbf5ce3162e60a3e1e02dee0eac9edd30d7b42d2fbb8fb8a8d555eb39b303ae98c0d0920728a01f44b35ac84db1e1d63372781da1e162ef78b0b06221bf857ab38d863105e35933671bbd80decd73692b04e0252279cbb8f4d8470ac02f3e85039b3927d1f57fc7d16a9a94206e25f9334331e561402e9c60a76f69ad6edbf3983082478af7d756410074317d6e4189f577004911c1f629f44e8812c89f21cecca2d2533023e5666744e40f8cade81caa6a9f26f501a2231c93d6eeb645795ba8338b1be488a3232daa5a6cab8239cef268f3a62fe71eaa4a4e0d7eb65000e232a1edda06e95fe69d700b5"}], 0x130}, 0x48000080) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:46 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xe3, 0x1, 0x0, 0x1, 0x0, 0x5, 0x80040, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000040), 0xc}, 0x4, 0xf67, 0x200, 0x8, 0x5, 0x6, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) socket$kcm(0x21, 0x0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='memory.events\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:46 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x3fd, 0xfffffff8, 0xeffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r4) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0045878, 0x0) openat$cgroup_ro(r7, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:46 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:46 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:47 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0045878, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="006d026d00027920"], 0xda00) 22:45:47 executing program 4: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0xa, 0x0, 0x3, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0xa}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:47 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:47 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0045878, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:47 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xfffffffffffffeba, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1c1669e547086c37, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r5, 0x0) openat$cgroup_int(r5, &(0x7f0000001500)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000001480)={0x1, 0x70, 0x20, 0x2, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0xc0045878, 0x0) openat$cgroup_ro(r9, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:45:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x7f, 0x40, 0x8, 0x93, 0x0, 0x1, 0x40080, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x58080, 0x8000000000, 0x4ffc, 0x6, 0x6, 0x3, 0x7f}, r0, 0xf, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x5aeb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x8}, 0x40}, 0x0, 0x0, r1, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r3 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r3, 0x0, r2, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xe0, 0x1, 0x1, 0x7, 0x0, 0x6, 0x20140, 0x10, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0x2}, 0x8d2, 0x7, 0x8, 0x6, 0x0, 0x1f, 0x3}, r3, 0x9, 0xffffffffffffffff, 0x2) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:47 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:45:47 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, 0xfffffffffffffffd) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:48 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:48 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:48 executing program 0: perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x5aeb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socket$kcm(0x21, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000100)="512a0d148d5a4922bd8078df446dba92ed387f28f687e9f06a0cc01f57160504b0a393ca5fbb0566ef8602521065ea5a19861ec7fe55f84cff4d59a3850ef78b12e66dd0c0fa45d64575461a9862744ffb2af362af363ea1ad80b8a595891df980e095d80c871eb9a19ea298e395b11a2a03d76112a300cad96547f7f96481280a4662f2a2aade774c0583f9b1f74503633ee60c507441e784c2418544fbee", 0x9f}, {&(0x7f0000000200)="39536b0652f7e318fec1eecbc618beffef6480ff14831e23c483befabf89c3e282e34a0d56c5b189ff873feab1550e0e5c335064eea3ae78222c17ebb0a8d1504acd616942adf21a15d9", 0x4a}, {&(0x7f0000000080)="7532866c5621", 0x6}, {&(0x7f0000000340)="a11be3695f2cf67cc99784512b3202ce9567a96a060d765ea09a10c0b6ad7872abc26f7eb497933bf280e3788590d9b248a1ffcec93e8e4633268fca22c1f9258d2527e7a64d61fcd81c54351fdef91d65b8485512e95126c43fddf2bea0f96760c6e1fe027c74c3b599e65ca499c75da3b44756b4a831b9f3eb30fb07c8b086505ff1ab81ae4bd9e38ecc7a5d7eeb610db630e3d1ec54846a18807e43c0077b7104b64c5fb396541c6015b2a965e149462f824528de1c3cfd8567e9d4072198629c036589e9de9baff33a1cb2513c8c9b0ed590beef170db09605143c09", 0xde}, {&(0x7f0000000440)="5ff7b2b0838c84263fd550acb52ee9cc2da6dd1b791fddfc8d38fa139aa5fbe26152eb8c48e59bdbba211f72071f573ea493390b5254b12b64d8efa9e16a2fb916786fc75006c6e7d5e601557e11a8fea10484fe319e7dc50d1f5c9700b6ff074a129103bef7a9c781d5d274312da6ad90dbad9a2cd5101f6e8e7c21c5b9cdb5e9791d33bd89a251d2536b4c07c3b6e7d8a5266cbd0e62fc35c2dde48e8a316963d49e6dbaade25c86b690b60c2fa00d52b202106c08655f0255cbd055caebaf665ab5f1c978666bd8e8417989974cf1b71f4fafd302927e0fc2c4e8e8068fcaffd418ce45d79d1c925e7471f2c1c3370534e6fb3b03099f87544dc0b21b16f1e306cff5401722541388a7bf1a813b65b659a9a9f587efc30c4b26c5ed9cb3ab0db2ead809be732835e1a30065918913e02241b65261a49bcb1fa21e868a3e7b02275133cbdb1894ad4823fd00a71bb9b99db85a78a515d4430936664321bf2120cd1b6fafd96fce10db81c5daada91a1d235c290934293033d8f7929e0fcfc191f93ada90a99ea8a4c0b9ae24944e355f537f2baa1c293d62920a18c5796f79575659bd00f801e2e0ad476dbd40d3d368319eddfc00e009eb51d952b031bcc6343a584f7268e182b43775aac9732fa4f8bb6c9e43f03ca648cba6e272f1f712d3b622cc2497b72c656c675eb045aa43125689c000ffcb884d8e653c2179112329b1b6944714e7976b01b2cbac1429cc21c6d7bb49c5823ad491cc68c696f2401c03b85c3f49a350d8bef48ba637e3e22e52dbc8f546bbf98f1eb5aa22fef4261645ab2a95ee1197d5e7d1f35b13264c5193e6404bd98bae99c2842cec5fd97ab16b4d3ce6fccb54a994b5ec942cededc7fee8958f8dd5fd060aee1b6bd5900a6d08b0a40fa510e452534afeb2f54e7354cb058d2e42d4038093699b18544d64aece1ad0317003ff2363e8882a6e77107edc558b5c7dbe0f013c454823bd481de5fa345dd4a6c762dfbec50a8056de4da2e2d485258288501030593b639729191d16ef2a27e6410ef9b418aea529d9d0b8f922dfda8693edee4250f6e9e1ae0e18b0c4446de25c523fde45716bc28764d62bc1229dac74e9ed37d1089697c48f27d7b8a134af305a23160a55ff1388aa5f6bb28c5ed2c8b3139da7dd923501e3b7462121a092624d570390a86be636fa5bfd41e62d9e8d98ec23a8840f71040953208826586e2d9f3640819fae28c590d45b1442c3d6c0d89fd059a28948d8fb9fb2d6f25403b50bdfaa0b54adf5e9702daebe0306b340db03f471d189f070519aa6ffd06946d7814ba4906942340d060266289375464547095ac92ba9e98f98de994c0564cc4bcfea83011ff5ccd7654141233e91fed7fb3ad651631a4f187047dcbd652ec32a2c10cade7ecfb2cd886d9d419a475124a3a104ccdd2715a2312612b723d8dc68749b36af0d37bcb5173fb68ec0444eeb48a31831f5a32888bc9e2e7b338b7e2f282163e19b7bc63cbc4b9475fc9171557925c9f87d46f6265b618237d62316fe2e1f7afb57223c791339410721206c1bb0dbbd3fb1227d0a5fab119188fa1536f9999eef5499383e26d02bdcd1ecdaa9023003a94835a068e1938db7548c66269897935b00d96c2a064e7b7bcc380ffc452a95552e53a11b00b6d8d854f1174a16c3d5e8cde5af3dc2e481e74aa9f5f57043d0d17dc91caebf724fa30f90419aefdbbe475d5897d75697c62fdb923aca52dad99f6cf586d7446df2e632e3a1e2294e85d5045968c36d3b4d6aeba802c7abbf7965f7d21d167b57886e720b4a514707898cf74b9f25200d7c9d13a097eb6ab0e07ed3ca7fda9a12741362670bb0cb066923b14c82752a9e73b4a0b613ce3f587a9e4432a4e059d33abe9de2d37f4f2d3d789ea61fc6de558361125db703ec706f71e539d14b91c4fd8574047cbf5a8e202fab74a9e2e08b6c342f356efe24316ba685ec5ec866fd88cc10811c34cc183b58a85cbd4bc84c46191626551939363e71ee36db4fe24d6f9c1b5e9b5d5448ba3ec015899b77fdf7bf06f27faf36396b5af83fe9b890e26da83fb9d6942cb1c56f7fa58eac831a869266e5501a39bf3561d0a6309276086db983df4845a9fce52e4c62dff604f22cf5ece5237de51ec0575ef4cab95e133a1dd3327f83125050e2a82be02419e2801be4b950925aa2d0b536e0db3803ba5a8101e0ec66d6edb200739fa2e41bdc35b3a5603e07eba158cd3d0165f2bd075cd9e264e13fde0a37f86df7ff2d4df714d406ef06772153fa1b9fb44950edf10ca739eec52b9f22207da8a1efe98a4852bec9c3f0c46273bf16d2d3fd65810f06a0bfad649720871206214c281b13fa73855e81d7955a9611b89f9f8219ac4a831d3d2c258339b43296942bb0ef89235491bd88794b3911886c603e1fe946898f80ba1b297849d428c0f3317e1088bcbe3e941962d8c52f5a0da5200e6f4010d2db1fcd0be9b1cd1b363b3dd137e0f2833af293db8d703f511481ee7ddfadddcb80e604303940bb068d3c0e328c9ddffb85c7c928f0c7e321cdacc4da9f9668858fab2554406e19ea2e0dcdb831cfcaea36133caa3f40af8d1ff5f977e7510ec368964643685570775c26a5c4d22d0a724881e42b8dff586f2fca8a0e7b84d56687df50404e7eabe0f1673fda695e698e2048d0d92fdc7fa0f348277c8afbff5bb526d574bbcbcb96716355492704f4c3a657d37ca4f09a265739c62c82ee4eb91167310127c2980eb05fbe66616e30ab967af43012f4a82517d0657642b387a9c9953a47d4d95a4034e00a210074b3bdbeb5291a4daab47aaead52f9e40e1188cfc0b04e2ff10087036a636bd6bb8629e80274e6441fef3f096c168cb384508e9f988df02fd62b7d12290b89f5dda59cd27366b36673ac15ffcc26c6c36e0b873b3e9e5d54a18c53a0733a715dba1dfbeb74fc3f8effa47abad43e5f2e3a3d846e155b81543c26ded981d4f07bd97e03af4ebac4298615c7d651f05f22e66728457b01683edd4f3b185babaf275d04f14a4130e39bf14f6016d24278de24b8eb90003436af1d8e7f1493ea0b986631b3011665dc5f5d2399d373c847072f60cea50b38125bae2893944e39f4797a0323bf006da9237abcb4ae64a80f54527ad7e5843f20cf341425cdb9bf4f018a0646728c86ffaa4799701307de70a20f7a547d6c19c03ad5bcba9cfad66d0dde8196e7519845a9c502b926a3ec7c17203fa3661427f81ff85286d3341c0516d7d8e14c2811d829415e97de5149f4d07e6c2557ee9cdffd3b9c6d09304a364f7f2d4a1b54a0772283fc9af9c081a9b16e8cf81ab880e5f15c1bdab5f7a5754021be777601f0e9f2938e3a5fc8ffb49d59a5feeab47ef405e48da304e4837cfc02e1edf00ea3f13022fe1de7dc364a458fe2949d70957051b4db7d6ee38a7447a80feefeccaa74765fabad750e0ad15da629994a4759cd31d0d480bf79389b7511a1a9508a36c512b31d575e1e5cb4784fe08a031040bc28ce5bae1cee3e126ebee19b1fb55e6ffc4fd5076df435494b00e6bb6c480142ca76dd0bd46851057497d321ab50e9bdb0d5fb14f46326595b5c9893fd1952bf0841d4b319e50a4eea47cbd61d5b4539ecc81e695639aa5fb99d80a177866fe5b284829378e9724968843b2bdb8009ea89b1b64a1b5b2a2f446008fd0acca3d068230bff045c2b5765389774fa8f9fc505e09b2447cc8458f990b05e0f03f220bf1d11a0646b51f49143f678715067e567b2f98c6f2aaa47eb07891c2b8e6cf792bd759f90214e9305628ace0999af2470f52f9552ac43b9af852c7d035a4efeb09c3d842f4aff86abdba9d9e7040c82544798abd1b0d85b81dd3ae72451f374a362ef35b309cd83127d402bcc33f3dcad772f71805e661c3726a9729b54ec0e8d8aceea9b5800cdaf7cb4e7d2d124619fee0fb07e9db05835d565792ce463446bd8698f622d57a0d35e7f57936bc2763ac5f68317c1f55ea1651eb15a5d7b146e00eeeb231588abe9bfe3f22efd85192d4cf5959a56591559e2d8b898f44044bf456c5244f1c8380ec6f6f04ea2124c956bdd32a3f1d84377a5dcfe892187bfbe57676e5964d29a30d272fc8621dc1c621eb5f0f2ae5f2272fe684d660e2f6420041f02bdba60f9c71951a571cc068f7b8f576e5f12cb0002915aa487897ea1808bcfe58df72183da6dfca37ff44341923ed79d4d2eff9ddf51da938d66f91166e2ea9c8f552cd55d63ca2af6c7422396a17fd612e9541313f511dd9b61a4449089f49d540ad3aec54615a83e46c8626d383844f9a52a5e73d916fe2f2b9f5632746fce29b738266ad77eb50362aa75f88930c7aebfe2cfefb4e98268d428ea449573127156d4631c82003e66b9cd786344085be0585ed4accf7b503b303f508f0a57c9feec5cceac2c03840981b2f119bb5a60b66b4a2494a659f409a1611a8e6a1ef617ad40c38a437bf95ace5b7487dcc1bda703c38b38b073e982f5078ea0e4b12ed964f7c7a6ae2a43cd6ff8b916d64e3b5ee7eaa55acf165c71159c6fb2868e5ccb8b6931389a065534264e84811bb016b111501a148acb0ca67115035ea4df3c089e2390e0d5c94ce4f54b61c3606f5ac63a9d18dde780f6b963bed5e10c4010f8617d59759dc31b764b86143abf1f474997c38233f2c319028d4579ffabbd678ff82cd53a1db3fe023baef39eca1f407e0212b904a4bea207f7d74dd7e7bfe3d17c43f44d30dfb5b65bb0d5627306f371d7730b89c6f59c9252c75a03322ea3b4e1260e5160b74d215f91df3e9ebbd666ae4492a412a530696cc61eca824bbd8e0d0b1e8314feed60cc179cdf85ed36b70c0be129a9f4d657d6e3c97475c8e4d230afac4b1ca3a2e7080f34da95794c84337951aa7f67c2380eb3b8ff8229932d261ff86c51bf64ff846231da90b8324ea3cfe1d614999077bbe50cdbe98a097b83ac80ec8687512d828d77211494d1ea68c1958f49232f5a145a6c65e3622c15273464312f8df1c2c0f23964397ba022c3617febd0424aa4f5ec06a00aa4ac3e6a1b9eef2f95420d46ced8b7d7480a968e950c2714b14165fb4d15d68867ae96abd7701ccfcfb56a4a1b6eef57bdd2cc259056e95f0d7a175aa0405f57115bfd448538519f6e33e25bb535933b772849de3f99e7675ee679c1b6c353ad6de58d9ed5ae6923c7a99214e1bea8fb4afa7c70ddfbd36c9666c188b75c3153975e8c8c6f28642ae75b90244e460d7dd1a93c30045b7cc66cded226589e3e325e7738e101267dae047044eb00cd7459e3dffe784bb49ec645c906619ef09cf986cfdf8e675a25520ef35fd2306de89da6320d3e0fe431606f0a4735112d5bd2426e36e2306844ba8cf19f53cd7142b31ec013ffcd8e34478bff065e2fa5c0f395462c8bf59a19f2267671f27a6e22512156be8f852f28bb3c3bb322492d7c971351a9b91f76e2f0619537b05c107545e32ee934c3b4579cc58918281ffc7b2f67b633497f05f4ad7a84c59d6fdb007e9e5af3c1c7b92a14b871c128d4b5e050a3062175b37ab79b66612227b4548e73eeebe7a058d95228c5cea06a62b9a567de1b76bf642a2bb2214cc2715e19d038460936ff97f9ef59c679ae577f51793c20858a633f56bc34148e3e6405973dfa08c5267c74a63822de6ddd0a09ca50bf1671ed0a96cec89db4a6951dfd7e76892f3edceb6f90031a2966c9429ca5e3b1817963bdeb5a01d40356125669ecc3d41ec7a1b033dbe7ac", 0x1000}], 0x5, &(0x7f00000014c0)=[{0x108, 0x118, 0x147, "ac8a83699009357825e3eafb6dcbafb2839d3257ff5557ad5b9cda6a1072b6b00c6abe419a6b411068fdb96a4faebf0520bca9911cc2f4d871f8561d98f5e3e48e87490a628435f6d0897995c96bd636f81e7ab1a30fe5a52adcc50e5fb7e8c057c6b78f008c8c295b3a94b781da8e68dccb5c6f3d8addf5228597be1074a822dd3019bbd85110633aab4106164d8a392d39a763b2bd70e193444ebc37e8985d8da9d4638d128df0656a63cafc26be1a1a8d4ff4285945aadf9663fc2addc900cb7182bec8b1c59ab993e1ca05693a5e04752e4c7a2ed10de7bbca4c14d3baeb75b98a1889aa22b45abea9681967216db2d67d6b"}, {0xd8, 0xccdd244cc6dc927c, 0x64, "b0ff208025d74c46c332e7960125bdb3eb21592c03bb4805725155921ebea5e27062c5e8f3fddf69dae94f41d326ba549fd06ff53d837e9fe0ead394694cf6bf0f76035f75139985f823accd3c6fe395e678b02378cb3cfc156e2fe25efdad6911f41fc66106fce86c4b3e887225fc0be901bc7c23a07b04f3b42d64cbeffd147cb980b2cfc0230bb95b7367116eabf65939b8538177196df5c10c0afb04bef2d6163eb33b0e3c8606157562fd51ce4ed2a9186e6331f786df1744b4c2247b3db5"}, {0x18, 0x114, 0x1f, "8fcf6cdbe478"}, {0xc0, 0x115, 0x200, "c6e78d654a6618171ebb6145032d816423110a6902e7433ae521e9bed59b35fcf13b830332a228e773d31c490fd36859facbb9ca70403b4939505a01b033b5cc53d1e9a0d0b632fa25f0e1e159ac47246f250d07a89975764326c5445015d77cccaa09bd32ca5c4a1f4f13c5ba40e612f6131c43f7cbbc5f81b9f05e8bc1e9f966fe7682e59b9eae26f8823ade95e19be0c1114a7773bca2d6537cbdf4387f8fba4c836cfe8c8c9e356f43"}], 0x2b8}, 0x8000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:48 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:48 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0xa0000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000001480), 0x2}, 0x1004, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f00000014c0)={0x2, 0x70, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="4a6ca37a7f6da0cee1bde5cd2a0b0ed326880f0ea1a4e2fde9ae426468f06544f624ad59732bd61e8e012057309b4b448e0832f53a2cd4ec4a3ef18002a1c35b673a93079cb113c00cc556dfa439147b11e50ceffd9b88da1b41aa715aabaa936722ea556aac39e16e1b0db429d569bcc5eb1e84906ed5500a5cd48aacbbe41eafafd5b66e51c061b462629643c95c7677b053ec5279baf185cadc4fb3ca7da03c13d75459e191027e706fe5e01a27c24c61b00497ef53042a8903bab73fc596bf7f4e83294371457def1bdeb5ef2014ddfbcb0a5c7ba154785aaa511e712f96f9eb2d3cdc8ff169b69d31c9a04521c5ac3cfe90e134f8685818192d7c433d5c259ec08f5b"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:48 executing program 4: socket$kcm(0x2b, 0x1, 0x0) gettid() bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) 22:45:48 executing program 0: r0 = getpid() perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r5, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r7) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r2, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r9) write$cgroup_type(r9, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000004800)={0x0, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="18120000", @ANYRES32=r3, @ANYBLOB="00000000000000006dea0c00fcffffff6d9df4ffffffffff0d57ffff0000000085100000070000002003f8ff0000000085100000ffffffff18180000", @ANYRES32=r4, @ANYBLOB="0000ba0200007a00"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000400)=""/131, 0x1f00, 0x2, [], r6, 0xca451d872c257773, r7, 0x8, &(0x7f00000046c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004700)={0x0, 0x10, 0x6, 0xe}, 0x10, r8, r9}, 0x78) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000040)=@xdp={0x2c, 0xa7711b21ee44780e, r6, 0x21}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000100)="060b8628f7b3b76b66f49cdffd10a79590fb392616ad88f29fd59a56768476a592838c20973ccbc4722ebb7581842522d77946ab9bd25a0c42a122b20018fd22a2875c3eb8ba9d56985adb", 0x4b}, {&(0x7f0000000200)="f6fc530541a45c044e25e4dd6f41139cc086da10e9d51549e4297d04d540f8c033a93591ca98d66497c35a706ddce4214b106148d5ee6b2708b391e56bcdae84438a77126456d5ea8cee6bce61400020b6423c9daeb7d49b7795a0d1d235ca2807", 0x61}, {&(0x7f0000000340)="c11486bce21ca33669b063160c16ad9cf729e7e4e59f49570f3bb59cb894334c6339b89210338a1db990e7aa04c6bb708208b1688c3dce5caa32b45aa2b39ee4d05d01f0c40f9117f095b236814a2f029016580423be3e06449bb08a3153e983038a", 0x62}, {&(0x7f00000003c0)="160307fc3373cff1567513453dcd8a568dd75cee4155fe23c04cb01518c51c6043fea562e9e2cfc31fefe83c8acb87e54b2e70daf4b4a364c36a2854c045466732dbe53b735abd872078cba4c614df50c88c429631d3d028ff98f7180038", 0x5e}, {&(0x7f0000000180)="ef6c21fb", 0x4}, {&(0x7f0000000440)="ffe99aa2653c83e732b7dad9e1558c7cf60a6846535880aed0c5730f2d2aaa8f1c030e51e4e6f2228987e7c9ea3d3695e13bbb640246aa4553f374a4fc744da0d36dabde54cbae661b6b7730dcbe39b2fd807b47052f7133c8dbdee94e5e02ca4216f697f604efeedacbf14c5de66dc631a7745ddaec03a02f2a932fee084a3e0977b026f183fb9994c7bea4454d8b7f4c17fde362536171618a0a82e3270e9078090845864277b3b1dd9c57025293c07f84c6a4ce681256ec7efcfb443741a2086f2d9ec201b6fb92a761b3652962c6c19a2835aaabb9f02895a1751613c4ef6acef1504b74fdb1ce2778c439", 0xed}, {&(0x7f0000000540)="181cb1f2ba749cd1ef9d26980cb64a76ba832518b03c03a77833aae2a37f5242c57830463d37979029d4d98ddaf952ae1e7e67a6ff0ef5d7472aa1bc638e20a7e22244b3aee834180766f728dd87febd70f2", 0x52}], 0x7}, 0x40) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:48 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:48 executing program 3: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 22:45:48 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x1, 0x1, 0x4, 0x3, 0x0, 0x7, 0x20, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_config_ext={0x10001, 0x3}, 0xa00, 0x4, 0x1f, 0x0, 0x800, 0x5, 0x8}, 0xffffffffffffffff, 0x5, r0, 0x1) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1c000000000000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r3, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:48 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000340), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0045878, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x8, 0x6f, 0xff, 0x0, 0x800, 0x10, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x56f7, 0x3, @perf_config_ext={0x8a0, 0x800000000000}, 0x20, 0x2, 0x2, 0x6, 0x3, 0x9, 0xffb9}, r1, 0x6, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='rdma.current\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8949, &(0x7f00000001c0)='bond0\x00') close(r6) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r8 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r8, 0x0, r7, 0x9) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r9, 0x0) openat$cgroup_ro(r9, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2, 0x1f, 0x7, 0x1, 0x0, 0x3, 0x200, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x7, @perf_config_ext={0x6, 0x1}, 0x2004, 0x8e, 0x80000001, 0x1, 0x8, 0x6, 0x2}, r8, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="7cb35ca2c285355d"], 0xda00) 22:45:48 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:48 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r6 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r6, 0x0, r5, 0x9) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8fb, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) openat$cgroup_ro(r10, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x0f', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) 22:45:49 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0045878, 0x0) perf_event_open(&(0x7f00000014c0)={0x7, 0x70, 0x78, 0x9, 0x4, 0x7, 0x0, 0x4, 0x4070, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x2000, 0x4, 0x1, 0x3, 0x4, 0xfff, 0x2}, r3, 0xc, r4, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r5}}, 0x10) gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:49 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:49 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x81, 0x8, 0x7, 0x3, 0x0, 0x5, 0x10202, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0xbcfddb46eca6c8e1, @perf_bp={&(0x7f0000000040), 0xc}, 0x2001, 0x8, 0x5, 0x6, 0x5, 0xffff, 0x9}, r0, 0x7, r1, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:49 executing program 2: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:49 executing program 2: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:49 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:49 executing program 2: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:49 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r6, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(r2, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r3, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r10) write$cgroup_type(r10, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r10) bpf$PROG_LOAD(0x5, &(0x7f0000004800)={0x0, 0xa, &(0x7f0000000280)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r4}, @jmp={0x5, 0x1, 0x6, 0xa, 0xe, 0xc, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x6, 0xd, 0x9, 0xfffffffffffffff4, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x0, 0x8, 0x5, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x0, 0x0, 0x1, 0x3, 0x8, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map={0x18, 0x8, 0x1, 0x0, r5}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000400)=""/131, 0x1f00, 0x2, [], r7, 0xca451d872c257773, r8, 0x8, &(0x7f00000046c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004700)={0x0, 0x10, 0x6, 0xe}, 0x10, r9, r10}, 0x78) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x7, &(0x7f0000000000)=@raw=[@generic={0x0, 0x5, 0x2, 0x8, 0x1ff}, @map={0x18, 0xa, 0x1, 0x0, r2}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, @ldst={0x3, 0x1, 0x1, 0xe, 0x3, 0xffffffffffffffbb}], &(0x7f0000000040)='GPL\x00', 0xff, 0xef, &(0x7f0000000080)=""/239, 0x0, 0x10, [], r7, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x5, 0x1, 0x7, 0x7f}, 0x10, 0xffffffffffffffff, r11}, 0x78) close(r1) 22:45:49 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='+io +memorio`'], 0x1c) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:49 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027a20"], 0xda00) 22:45:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000340)=""/221}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:50 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:50 executing program 3: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:50 executing program 4: socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000300)="b1126ade94a0267ee78001b1f50c518ba2bf7faac1bf9caee783029f3a99a49703b823962acddda95ab23194bf255a93e5", 0x31}, {&(0x7f0000000600)="1461783a4d76f8e7fb25525461474aa908a85e224fe618c3147234205a341a90967675424c3572dea182a6bd5aa1479531af09489fee7e755d221478aaf54f782bc756588e2e3f9c142f1abec9658c532cfce5de34f26c52bccaa329d4c6441cc4ef81c42f8d9895c7389746ddb38a4f2225bfdacc8a6c03c749d91763b983a7726d3039e0a3aadc4a4d98bf386e41cced164f05883c3f268826279018acb210c27506a22d8e1c07004329825c7873ba484479d59ae2c5bd6f12e34e42", 0xbd}, {&(0x7f0000000440)="befd631c181ae33809a838829b4f1f07c49fc2cfb1c346846b5561f42a10c330648179d062b668f95144243000c184ce04ec89e8ba2bae0368ced8f0f1bf75951eb1e6e933fbb28707", 0x49}, {&(0x7f00000006c0)="1fb9df52ca6b63c844e9b709832e360aa58e15d3290ecf78f1cc929a14cb482d02812b442fc7d8f600c7f2f231708dafca7d2be2bc868b8b90b72bd84817ec585314a8747d0bdfcf32873089977124490eb0334e2aecfa63e1b799ab860f2e760b0dea2bc9933f8718bd266789af495ff8655d83956a6585b48d8edfb9bc656d2b69290c9babc0056a052dca8aa43a739a8d11df3eab4566ef1be7a8a592797031e2876870", 0xa5}], 0x4, &(0x7f00000009c0)=[{0x58, 0x119, 0x92, "3664de4f83bea7742b837eb9c6d7c0d6495cacaf225bb44f9817c4e5b36d282add08183115383c07fc2d4a497a4a3abc4e7529d6160277efd12e8f4fdc5ee14d206f16645e"}, {0x1010, 0x109, 0x2, "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"}], 0x1068}, 0xc40) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8949, &(0x7f00000001c0)='bond0\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/297], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000180)={r5, r6}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xaf) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r3, 0xab) sendmsg(r2, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:50 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:50 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="006d256d00027920b1a16f607105801b5e9b8221b9340ea2dba8dec6ceede759e16aba911e82299f77572ff3fe060ff3b06da07ca459fdaf8172e30d2658a465e8a576681155d962f5e55f004c56758411297af04ab4c27996636e196ecd4d4336180e2d35f9998c5b3cf66df8978376580be23af1876ee7ad085030df2117d0a6e66263320d75118b2e6f239d005f34b10516356c01afd27a509900000000"], 0xda00) 22:45:50 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r0, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) recvmsg(r4, &(0x7f0000004400)={&(0x7f0000004000)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004300), 0x0, &(0x7f0000004380)=""/121, 0x79}, 0x142) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000044c0)={0xb, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000001600000000e9f6a000000001fcffff851000000700df009500000000"], &(0x7f0000001340)='GPL\x00', 0xfffffa10, 0x0, 0x0, 0x40f00, 0x1, [], r6, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000004440)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000004480)={0x2, 0xb, 0x5, 0x1ff}, 0x10, r7, r0}, 0x78) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) close(0xffffffffffffffff) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r1, 0x0, 0xc4, 0x4a, &(0x7f00000016c0)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0x8c, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) openat$cgroup_ro(r10, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:50 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:50 executing program 2: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x70296e2e0cd3c44b}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="4a6ca37a7f6da0cee1bde5cd2a0b0ed326880f0ea1a4e2fde9ae426468f06544f624ad59732bd61e8e012057309b4b448e0832f53a2cd4ec4a3ef18002a1c35b673a93079cb113c00cc556dfa439147b11e50ceffd9b88da1b41aa715aabaa936722ea556aac39e16e1b0db429d569bcc5eb1e84906ed5500a5cd48aacbbe41eafafd5b66e51c061b462629643c95c7677b053ec5279baf185cadc4fb3ca7da03c13d75459e191027e706fe5e01a27c24c61b00497ef53042a8903bab73fc596bf7f4e83294371457def1bdeb5ef2014ddfbcb0a5c7ba154785aaa511e712f96f9eb2d3cdc8ff169b69d31c9a04521c5ac3cfe90e134f8685818192d7c433d5c259ec08f5b"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:45:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="e958256d00027920"], 0xda00) 22:45:51 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80, 0x0}, 0x10) 22:45:51 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r7, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r4, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r9) 22:45:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c06d256d00027920"], 0xda00) 22:45:51 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56}}, 0x10) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x0, 'pids'}, {0x2b, 'rdma'}]}, 0x10) [ 1905.496295][T15948] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1905.536202][T15948] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:51 executing program 4: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80800, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:51 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:52 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r2}}, 0x10) gettid() r3 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x11b, 0x12, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='cpuacct.usage\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x5, 0xfb, 0x2, 0x0, 0x4, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff5, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) 22:45:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r7, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r4, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r9) 22:45:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 22:45:52 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x16e8}, 0x0, 0x0, 0xffffffffffffffff, 0xa) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="450279203648a75905d99a64e578c393c6df18fae5b3a27eba110b1759865247495e6ed047a07b3ae8e852d7ba5b4a2354cd6e5a"], 0xda00) 22:45:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) [ 1906.176500][T15977] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1906.213646][T15977] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:52 executing program 0: r0 = gettid() perf_event_open(&(0x7f00000002c0)={0x2, 0xfffffffffffffe47, 0x5aeb, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x808, 0x0, 0x0, 0x4}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$kcm(0x21, 0x0, 0x2) socket$kcm(0x29, 0x52e599e6b5ffeef5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, &(0x7f0000000180)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x1}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="9eb781fb18ad3a04b8636fd58ead", 0xe}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="2925a8a6b232f308eb35b71f4494073e70890652efd8e1a6ff9d0ee43c9e653ca1527402bed6535be805a4d375333e2e4cfc063a853bd383257b96e9251de577c4e90096115d70b807dbff200d12d30da023523090598dee4463867ee9aa1654fcbfd68ad9419763829b22921a9e251b7e41c3c370f13306927b0d89c122664b0edf9d8b7c5af95259d524f93bd31946f3ee763be0b259e19dc7c33f4724d4ec1776e1f72020482c4a0d0f3658e83dc50d8ab6b6936daa5cb3167529455235f6b2a91f646f228f869d7596b10e525a6385846ab6aac30e1a602ac6d28cc9bba5b288eefd4cfac0", 0xe7}], 0x3, &(0x7f0000000140)="7be011a9d623175d2fcfbcec90e4ef97d8d1e439443f7348c136af0c70be15f54df0852469c8db67f45d73", 0x2b, 0x8000}, 0x800) socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 22:45:52 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@rc={0x1f, {0x7, 0x5, 0x5, 0x8, 0x40, 0x1}, 0x2}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000180)="26ab5f6d5c369a1fa24af15fc94ccea79277dd185d93c98a1a0dbf169a143c320c2dd219372b11591d3b9923314b0aeb5f3119e4296fc2e6154b0bb20e85fcad82cfd28e6e918b5523d2011b2caf6f", 0x4f}, {&(0x7f0000000280)="e9d008e4dc314bf0aa60db9e500e9f7a6f0abdb372e0ff9d240f29675ed397fc09d1aef259", 0x25}], 0x2, &(0x7f00000009c0)=[{0xa0, 0x66, 0x10000, "dde389a269647ddbf3990376fe149c441dc4a70a7654416c65d200e07b8a591879a6d64ab68c54b41b8f774eadb23ac7c90047e68cb392212b41095fbc329ebca09bc1613847666fa133e8962190f8f3a3b1a5970cda56ebfaa1634fc7293eb9d0de65daf6ec590861e1e3ab7b348d99af45fcd49980abc1daa675cb2fdf1b885b11c08933a2d9b36ac712"}, {0x48, 0x1d, 0x3, "3e6843ad62ba96d22942f3bee59a74bf08ac8b5138b34e152f7745284f8c7858882296bf140eb2f0fd404ae10a2e9d0d1d3de7336d"}, {0x100, 0x3, 0x5, "303facda209fb9c6df7d4729f2ee62065bfba4cf064e28012e3aa0a0f51c211c6fffe4fb5df95a440a945ac29506533a1a6c178edcb8a42b70a80b00752c05defa671c8cdccdbbcc49c22c23d54b033dc232a7e1cb5e68052cfd6dcb4146d439a42c2e1cb4d3d6653e44e4c5c20cf6b66853a7bff7279b28bb9b939f5a56db2bc9ed0c81d504c554df3efee50ec5b0d629d33c47e9a66aa02d2455c0284aedb190982f326f441df9015d6d39f8ca92efb4a095b5e7824268910499e55c4c942ce2e14c014f4f2f896db6da1de63c5db2aab916492c1ad6fd435abaafe39a7afd0f8dd1a5ecad0ac429356edb9f04e7"}, {0x28, 0x118, 0x3, "2ed8d53084fa5544c6368084e996f2cb7153529c"}, {0x108, 0xf149a25c56860e77, 0x2, "2b8832892307472fcbbe8be45159db0fb3374e23c5eeb08b008a3a1f30fa7670ba03e600bbf02443fe4848d9cc6305070ff819a0ef9b0f9caddafc8c79f1caf6b120ffbad254d5ecb48b4fd3a2b55860db37ec6e05a82772b4d460e3b3e51e545bc66fa3a5969820ccd082b2902a1127cf37d8bc1efee6a11e2f78e7a705a6d06a98165eb59bfa8cb528f162781db94ee05e1c8a2891d33d442a515eb14e7db534fc2ada938bf427fb0605561b6ad88a21fc8d880ef12c39bc3837fbf1b37e5197f493edc4a137a896131faa0efd827877e7545f29974f97903893809322d6f40851f736b0c471c394cf62981c4d5ad5632b7ce328bab8"}, {0xa0, 0x109, 0x1, "90047508b1e1f2232f3a4ff7c291a0473b35af587fe21ad4ba5b97822a9b2c90d6465badc499b37b385f7adc819f5711033ea323913968241fb5fcc01b269ffea2d6dfcb4f4888fb9c463fd1473eda12ed1dd8b0d09084919efca4e393007b2d089022172757af32593ef8efb2ae1d5c76f6e0b004375aad3b57bc9bba33cfac04c1fdf84ebeaa0b45"}, {0x108, 0x102, 0x8, "5e2c3497f34fca7e4ab7bbab9f635e6235006c60df2434178dc199fabe37d04af447cfbafd2cf14425741ec057e36439bb1a453e0d3bc14593bd507c02589d9bca0be5defcc614ae2ba6ce380f9e4cda27e8c6c3a8d79d8d2433624249c2c9a078115949b7e4db85df5f6e4888c878559d9add1f8bc2d2c5788e9d3851c5eeb720c1c82a1f3e063893517d4183e2b533bfe651880781c520c1b79977cb94bdd64ea373c808b627008e0b59758896fe94e7eac8b9ed0eb6a8c7316f783b30fc250628a04e8057d52337fdcf716436f464077c8f1c68e3f8d7b497ca4e9ff2f740ad18b192ce6254b469a9b6951e17671b23af4d"}, {0x80, 0x10e, 0x7, "9ca0d199a528bb3785376d6b0088fb4940b737df13b8846a960423de25eea81aa50c86d4e9d5cd439309536be888099d63cd696ac018516d8e57026bf5abf67d76e14adbd949be26b5416715fd5567dbb7f498288033d64075e3cefc0b05ebc3382f20186b12182159261b42592f8d"}], 0x540}, 0x40000) socket$kcm(0x10, 0x2, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8949, &(0x7f00000001c0)='bond0\x00') sendmsg$kcm(r0, &(0x7f0000001080)={&(0x7f0000000340)=@llc={0x1a, 0x30a, 0x2, 0x6, 0x7, 0x5}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000440)="9b068f078f9800af47a7a0fa5d0a994be7562a06b3b1db845ff531c11b4b00621546bed7a0caab1fe6a54108d08e258344d2ae8f837d7af7b4fddb626ae26392fe943e413ea53a9fa75f9e4c1f0cf847e13c3b8f37230e131abe9d606a161c1c114da950dbedd5937fc5fb73e181aa0806e991e024f75edc3954ac457a4cd450b9e800ea1717463f1e53250c8221165eb25b2cb7ce75f58caa291cb5d6984092314b1d8e392360ff51", 0xa9}, {&(0x7f0000000500)="ca8e1ba885bc46ea2d27e40acfdf659b2a874cdcff0c71711e0fb931b8726ac32367c1478197feb5c52261253071158b252fc69e16a9f8f6465af93093589e4794f388877a29d795fd9dd84dfa6a01e32039a93ca6c4c445e36a90383067bce575f18e96b724aab9e4a485c5fd1718defca7236129a7056e9f6b95600bd9ea2a58239b2b10fabb03d67ab5c3b4b33c491917a04e2183be85bf7a8ce527f20a329ddb0b4f42d7f9c12323ab1a694b191fa007eb3cb2ef141c82d4ba1a1e2bcef9d928a19cc4416839cdf6226669e0", 0xce}, {&(0x7f0000000600)="0578362124b9e40772c15d79a3fec8ad46918cff7267c98240ca6a247a4b3a85e948e0c34b1ac72eb77160f2cdc627b48c9c8f8fafff127a8d73a54c04208e2806b30c4cb636b7d1c52d0fe61f2e24437372ac66", 0x54}, {&(0x7f0000000680)="3a0bdf034c0603ab44525483f1da6abbeef56b9f71fb5c2b2188437b82560a495356cfdbd48b059ff7280d7d933bfcaec570d779d690bdc5f30fcfc312248732731f994321b1024327afdbd960d740403c622a7e13a547d2f3c58d811ac3d225b8356d11ed487758186089c691267725c972f04711d692f2e69c06d24a1a01698a28ef78225d2a", 0x87}, {&(0x7f0000000740)="85a655d1de895923d3f2c10a4577293953d292dcf5c7cd5e59190f4fece944", 0x1f}, {&(0x7f0000000780)="e2821908047915080cabe8e4467988bc08cfb43c61826a765a540569ab10d990213eb4a56ebcdf71cac3c76b477d312a1cffdb51ea3dca8c1e902d303dd0a9aedc39ffdaff4f20f26b4878020fd20ebaf6de975aaf2fa266649265a87017c32c94677ead9f804bfe57711385cd5bb007df1e923931e38216c98db033c3621b74c69fe4436cb45621525259d02e12d09239da2529d5aa7ba6583c2be74d40ebcfd08496a5412c5051b68b7425aae8f75c715f8c05629d", 0xb6}, {&(0x7f0000000f00)="28316c02ba64a32b12b9197fb166006a8c8f0b4ca0e804ef69bb75c3a2c0eab112b9b22c90d8ad960e60e5d41a601fe0df439f8d1fb53dcb008ac32edee8d009dae8411e4d9a7c79984a953363be64f2fa79450ddf049bb09d86ef83b93ccabb49f401fce7c7aa3fc65573b7ee6891696486a345b6601b671bffd7c91ad648bce3e2677232b9e319311b5e26a457e9b7ec890659df6c6ef04572cdd022b68ad27f00cc0788082fdfafc29ecc718d1b09635b12ef02a4c29ffc3100ed69eb6f78a2ac986f153b7452f9e5c0f0a34374e38fb565bf60f2aa24c5b25ed0e059a22572e082d6e11f1d486f91f6ef02b961", 0xef}], 0x7}, 0x40000) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:52 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz0\x00', 0x1ff) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x7, 0x6, 0x8, 0x6, 0x0, 0x3, 0x60844, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc, @perf_bp={&(0x7f0000000040), 0xc}, 0x14, 0xfffffffffffffd97, 0x80, 0x7, 0xad7c, 0x3, 0xcc41}, r2, 0xa, 0xffffffffffffffff, 0x8) 22:45:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:52 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x0, 'io'}, {0x0, 'pids'}, {0x2b, 'rdma'}]}, 0x10) 22:45:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r7, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r4, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r9) 22:45:52 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:53 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x03', 0x1ff) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r5) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8949, &(0x7f00000001c0)='bond0\x00') sendmsg$kcm(r6, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="920000313489"}, 0x80, 0x0, 0x0, 0x0, 0x18e}, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) close(r0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0045878, 0x0) openat$cgroup_ro(r8, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1906.867020][T16013] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1906.875787][T16013] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@func={0xd, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x30, 0x0, 0x61, 0x30, 0x2e]}}, &(0x7f0000000100)=""/160, 0x2b, 0xa0, 0x1}, 0x20) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000800)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000880)=""/158, 0x9e}, {&(0x7f0000000940)=""/53, 0x35}, {&(0x7f0000000980)=""/205, 0xcd}, {&(0x7f0000000a80)=""/151, 0x97}, {&(0x7f0000000b40)=""/145, 0x91}], 0x5, &(0x7f0000000c80)=""/223, 0xdf}, 0x100) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0045878, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, r3}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f40)={r2, 0x10, &(0x7f0000000f00)={&(0x7f0000000e40)=""/162, 0xa2, r3}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r5, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x15, 0x7, &(0x7f0000000f80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffff}, [@jmp={0x5, 0x0, 0x4, 0xa, 0xb, 0x50, 0x1}, @map={0x18, 0xb, 0x1, 0x0, r5}, @jmp={0x5, 0x1, 0x1a, 0x8, 0x5, 0x6, 0x8}]}, &(0x7f0000000fc0)='GPL\x00', 0x7f, 0xcf, &(0x7f0000001000)=""/207, 0x41000, 0x212306891659dc5, [], 0x0, 0x81cc070849bb4f4b, 0xffffffffffffffff, 0x8, &(0x7f0000001100)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000001140)={0x5, 0x9, 0xdbee, 0xa}, 0x10, 0xffffffffffffffff}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1f, 0x7, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6e5d}, [@jmp={0x5, 0x0, 0x0, 0x6, 0x6, 0x80, 0x10}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x1f}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x4c, &(0x7f0000000340)=""/76, 0x1f00, 0x2, [], r0, 0x12, r1, 0x8, &(0x7f0000000dc0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000e00)={0x1, 0x2, 0x85d, 0xffffffff}, 0x10, r4, r6}, 0x78) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x0, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r4, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r5}}, 0x10) gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r3, 0x0, 0xc4, 0x4a, &(0x7f0000000840)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x80000001, 0x0, 0x0, 0x154, &(0x7f0000000300), &(0x7f00000006c0)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) 22:45:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r7, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r4, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) [ 1907.295995][T16040] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1907.304163][T16040] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:53 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8949, &(0x7f00000001c0)='bond0\x00') recvmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000280)=@ax25={{0x3, @bcast}, [@null, @default, @bcast, @netrom, @netrom, @remote, @remote, @null]}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000300)=""/104, 0x68}, {&(0x7f0000000440)=""/201, 0xc9}, {&(0x7f00000001c0)=""/49, 0x22}], 0x3, &(0x7f0000000600)=""/37, 0x25}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x7, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x112dd7cbcf25665, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0045878, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000007c0)={'lapb0\x00', 0x6000}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000040)=r5, 0xab) sendmsg(r4, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:53 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000040)=']]^\x00', 0xffffffffffffffff}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x34, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000006b80)={&(0x7f00000067c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006a40)=[{&(0x7f0000006840)=""/54, 0x36}, {&(0x7f0000006880)=""/173, 0xad}, {&(0x7f0000006940)=""/240, 0xf0}], 0x3, &(0x7f0000006a80)=""/248, 0xf8}, 0xb283ac993e4b04a) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000006bc0), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000006c80)={0xc, 0x2, &(0x7f0000000280)=@raw=[@map_val={0x18, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000540)='GPL\x00', 0x81, 0xc9, &(0x7f0000000580)=""/201, 0x41000, 0x0, [], r3, 0x0, r4, 0x8, &(0x7f0000006c00)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000006c40)={0x1, 0xd, 0x723f, 0x8}, 0x10, r5}, 0x78) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r2}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000100)='{.proc\x00', r2}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='rdma.current\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f00000006c0)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0xffffffffffffff49, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xe400, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="0b6dffffffffb6b200c1c30d315e46810989d40afffffffffff7ffff5711c7e7d60a171a93c7eebf9aec8920"], 0xda00) 22:45:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r7, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r4, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) 22:45:53 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r4, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r5}}, 0x10) gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r3, 0x0, 0xc4, 0x4a, &(0x7f0000000840)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x80000001, 0x0, 0x0, 0x154, &(0x7f0000000300), &(0x7f00000006c0)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) 22:45:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x0, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1907.644818][T16051] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1907.668854][T16051] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r7, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r4, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) 22:45:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x9, 0x3, 0x0, 0x80, 0x0, 0x40, 0x20400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x8}, 0x8000, 0x72c0, 0x4, 0x9, 0x5, 0x4, 0x7ff}, r0, 0xa, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r3 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r3, 0x0, r2, 0x9) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x10, 0xff, 0x41, 0x0, 0x0, 0x6, 0x8200, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffff5ca, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x110, 0x4, 0x1, 0x5, 0x0, 0x4, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, r1, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="003ba6ddf6402fbfd11dc56d256d000249d041191a28b9ad0b71e3c179"], 0xda00) 22:45:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r6, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r7) 22:45:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:54 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="006d250000000000c424e67b5f8529917103ec93cd9e70b685f0086f6f5cdd57b979e1b1b96492f849623f0c3f5d9026877f02356a864fc886e3d794581d82f42485175f219ab2882b125f71f59c62f3607886e66dce5a57f74b2cf618aeb4cc1dc2b99a0c3b75644b9dc46d66a4cc3e7e7eb3f720a5987a167af6b7ee53034330220af002885b"], 0xda00) 22:45:54 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/\x80e\xf7\x05Jet/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:54 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r4, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r5}}, 0x10) gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r3, 0x0, 0xc4, 0x4a, &(0x7f0000000840)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x80000001, 0x0, 0x0, 0x154, &(0x7f0000000300), &(0x7f00000006c0)="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"}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0xc0045878, 0x0) 22:45:54 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) r5 = gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r8) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r9, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x70, 0x1, 0x9, 0x6, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8, 0x51}, 0x8000, 0x7, 0xfff, 0x6, 0x0, 0x400, 0x1}, r5, 0x7, r9, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) 22:45:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:54 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r6, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) 22:45:54 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x78) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:54 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="006d256d0002792070cd2fa599342f6f161c176566e754671cb12856d651706bf2f746c3dd857543184faa4d544ea5fea13cd6a7a6f8da2263cc2c0f43b8a712225b633ed0500133c3e42ccc86df3424b5ad0b35b8658f251fbc66f18b8b360f9bf4262e752e1fd8d466f6e6e1c54df506898baa66e7533df99a1185edd1042d10cdbf62e36fe114033b588d073d94853b8b6712ad624c8fc33f9f1e26ccb37f54742a642217f5239ef4a5ecb1abda76676e20d37edbca2587e1b5a083ca2b9b35a3bd7a36e95dd123f873aa17"], 0xcd) 22:45:54 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r6, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r7) 22:45:55 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:55 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) r5 = gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r8) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r9, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x70, 0x1, 0x9, 0x6, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8, 0x51}, 0x8000, 0x7, 0xfff, 0x6, 0x0, 0x400, 0x1}, r5, 0x7, r9, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) 22:45:55 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x25f78b3e6245b231, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net;tun\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:55 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, r0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') recvmsg$kcm(r1, &(0x7f0000004b80)={&(0x7f0000004a00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000004a80)=""/115, 0x73}], 0x1, &(0x7f0000004b40)=""/36, 0x24}, 0x140) bpf$PROG_LOAD(0x5, &(0x7f0000004c40)={0x1a, 0x3, &(0x7f0000000080)=@raw=[@generic={0x7f, 0x2, 0x7, 0x1}, @generic={0x9, 0x8, 0x0, 0x20, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x855d5c0, 0x1000, &(0x7f0000000200)=""/4096, 0x41100, 0x4, [], r2, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000004bc0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000004c00)={0x5, 0xc, 0x7, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) 22:45:55 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r4, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r5}}, 0x10) gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r3, 0x0, 0xc4, 0x4a, &(0x7f0000000840)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x80000001, 0x0, 0x0, 0x154, &(0x7f0000000300), &(0x7f00000006c0)="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"}, 0x40) 22:45:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:45:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r6, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) 22:45:55 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r6, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) [ 1909.776636][T16167] FAULT_INJECTION: forcing a failure. [ 1909.776636][T16167] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.790750][T16167] CPU: 1 PID: 16167 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1909.799458][T16167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1909.809533][T16167] Call Trace: [ 1909.812854][T16167] dump_stack+0x197/0x210 [ 1909.817222][T16167] should_fail.cold+0xa/0x15 [ 1909.821840][T16167] ? fault_create_debugfs_attr+0x180/0x180 [ 1909.827673][T16167] ? ___might_sleep+0x163/0x2c0 [ 1909.832553][T16167] __should_failslab+0x121/0x190 [ 1909.837510][T16167] should_failslab+0x9/0x14 [ 1909.842028][T16167] kmem_cache_alloc_node_trace+0x274/0x750 [ 1909.847838][T16167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.854086][T16167] ? cap_capable+0x205/0x270 [ 1909.858672][T16167] __kmalloc_node+0x3d/0x70 [ 1909.863253][T16167] __bpf_map_area_alloc+0xbd/0xf0 [ 1909.868269][T16167] bpf_map_area_alloc+0x20/0x30 [ 1909.873111][T16167] array_map_alloc+0x4bc/0x7d0 [ 1909.877865][T16167] ? array_of_map_free+0x50/0x50 [ 1909.882794][T16167] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1909.889053][T16167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1909.895305][T16167] ? array_of_map_free+0x50/0x50 [ 1909.900239][T16167] __do_sys_bpf+0x478/0x3810 [ 1909.904840][T16167] ? bpf_prog_load+0x18f0/0x18f0 [ 1909.909913][T16167] ? __kasan_check_write+0x14/0x20 [ 1909.915013][T16167] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1909.920545][T16167] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1909.925865][T16167] ? wait_for_completion+0x440/0x440 [ 1909.931151][T16167] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1909.937396][T16167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1909.943281][T16167] ? do_syscall_64+0x26/0x790 [ 1909.948031][T16167] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1909.954083][T16167] ? do_syscall_64+0x26/0x790 [ 1909.958799][T16167] __x64_sys_bpf+0x73/0xb0 [ 1909.963224][T16167] do_syscall_64+0xfa/0x790 [ 1909.967845][T16167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1909.973749][T16167] RIP: 0033:0x45a919 [ 1909.977639][T16167] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1909.997245][T16167] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1910.005754][T16167] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1910.013856][T16167] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1910.021844][T16167] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1910.029997][T16167] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1910.037989][T16167] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:56 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r3}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) r5 = gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r8 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r8) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r9, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x70, 0x1, 0x9, 0x6, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8, 0x51}, 0x8000, 0x7, 0xfff, 0x6, 0x0, 0x400, 0x1}, r5, 0x7, r9, 0x9) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001540)={r2, 0x0, 0xc4, 0x4a, &(0x7f0000001300)="28f844bfac3ad694833b1601bf4f008d41e62c4c0c893c283fef52e08fcf8b6ddbb3c5445fc15fa17533983ceb146b71abdf47dcdfdd0a4efa0d3b7fd098e12666c6267dbb5f73829bbdbe7b045bcc130155fe8ab2bf6fb481968334bd89e65e354b803ab8c3fb96a02395b24639e264f3e863509aee968b1f699a4f3525caf2b075ec1086a28f05ad3b10570d94ea6ee8dda17eb344f4ecb542d0cbcf9d31450d836ab4921b63b2a0de9d72231305d52e341018fb8b78652676819b1715f5569c566eb1", &(0x7f0000001400)=""/74, 0x60, 0x0, 0x0, 0xfffffeeb, &(0x7f0000000280), &(0x7f0000001580)="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"}, 0x40) 22:45:56 executing program 2 (fault-call:4 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:56 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) [ 1910.216256][T16176] FAULT_INJECTION: forcing a failure. [ 1910.216256][T16176] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1910.230051][T16176] CPU: 1 PID: 16176 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1910.230062][T16176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1910.230067][T16176] Call Trace: [ 1910.230095][T16176] dump_stack+0x197/0x210 [ 1910.230121][T16176] should_fail.cold+0xa/0x15 [ 1910.230146][T16176] ? fault_create_debugfs_attr+0x180/0x180 [ 1910.267717][T16176] ? __kasan_check_read+0x11/0x20 [ 1910.272761][T16176] ? __lock_acquire+0x16f2/0x4a00 [ 1910.277802][T16176] should_fail_alloc_page+0x50/0x60 [ 1910.277820][T16176] __alloc_pages_nodemask+0x1a1/0x910 [ 1910.288643][T16176] ? fs_reclaim_release+0xf/0x30 [ 1910.293619][T16176] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1910.299365][T16176] ? fs_reclaim_release+0xf/0x30 [ 1910.304337][T16176] ? fault_create_debugfs_attr+0x180/0x180 [ 1910.310165][T16176] cache_grow_begin+0x90/0xc60 [ 1910.314947][T16176] ? __kmalloc_node+0x3d/0x70 [ 1910.319638][T16176] ? trace_hardirqs_off+0x62/0x240 [ 1910.324754][T16176] kmem_cache_alloc_node_trace+0x689/0x750 [ 1910.330581][T16176] __kmalloc_node+0x3d/0x70 [ 1910.335107][T16176] __bpf_map_area_alloc+0xbd/0xf0 [ 1910.340158][T16176] bpf_map_area_alloc+0x20/0x30 [ 1910.345004][T16176] array_map_alloc+0x4bc/0x7d0 [ 1910.349834][T16176] ? array_of_map_free+0x50/0x50 [ 1910.354778][T16176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1910.361012][T16176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1910.367346][T16176] ? array_of_map_free+0x50/0x50 [ 1910.372330][T16176] __do_sys_bpf+0x478/0x3810 [ 1910.376932][T16176] ? bpf_prog_load+0x18f0/0x18f0 [ 1910.381857][T16176] ? __kasan_check_write+0x14/0x20 [ 1910.386959][T16176] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1910.392522][T16176] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1910.397801][T16176] ? wait_for_completion+0x440/0x440 [ 1910.403080][T16176] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1910.409444][T16176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1910.414905][T16176] ? do_syscall_64+0x26/0x790 [ 1910.419579][T16176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1910.425655][T16176] ? do_syscall_64+0x26/0x790 [ 1910.430337][T16176] __x64_sys_bpf+0x73/0xb0 [ 1910.434740][T16176] do_syscall_64+0xfa/0x790 [ 1910.439233][T16176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1910.445107][T16176] RIP: 0033:0x45a919 22:45:56 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) [ 1910.448987][T16176] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1910.468574][T16176] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1910.476972][T16176] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1910.484944][T16176] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1910.492903][T16176] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1910.500883][T16176] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1910.508858][T16176] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:56 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) 22:45:56 executing program 2 (fault-call:4 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:56 executing program 1: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='pids.`\xe7}\x8b\x82\xdd\xb0\x8fIts\x00', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0045878, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='pids.events\x00', 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x8}, 0x1004, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f00000001c0)=r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x242000, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev?net/tu\x00\x01', 0x1000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x6) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f0000000040)=r6, 0xab) sendmsg(r5, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:45:57 executing program 0: r0 = socket$kcm(0x29, 0xf, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8949, &(0x7f00000001c0)='bond0\x00') ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r3}) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="006d256d7920000000000000003eac804f2b8f0e4bd50baa12295b959ba19d84898eda74ef4746fa37e4524112e41cda3af552ffca56a2b098ced9eaa184128a9217ff57f7a0c3a199d6870f7a8ac8f66e48d5f4ecb460f641d6782c5f1f2effec04dd35ca6e87938d72c236c3b962fe30d5cd"], 0xda00) [ 1910.888173][T16194] validate_nla: 12 callbacks suppressed [ 1910.888185][T16194] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1910.920149][T16194] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1910.975922][T16202] FAULT_INJECTION: forcing a failure. [ 1910.975922][T16202] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1911.022699][T16202] CPU: 1 PID: 16202 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1911.031411][T16202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.041606][T16202] Call Trace: [ 1911.044899][T16202] dump_stack+0x197/0x210 [ 1911.049228][T16202] should_fail.cold+0xa/0x15 [ 1911.053823][T16202] ? fault_create_debugfs_attr+0x180/0x180 [ 1911.059618][T16202] ? ___might_sleep+0x163/0x2c0 [ 1911.064484][T16202] should_fail_alloc_page+0x50/0x60 [ 1911.069672][T16202] __alloc_pages_nodemask+0x1a1/0x910 [ 1911.075033][T16202] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1911.081186][T16202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.087428][T16202] ? find_next_bit+0x107/0x130 [ 1911.092229][T16202] pcpu_populate_chunk+0xf8/0x940 [ 1911.097340][T16202] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1911.103059][T16202] ? find_next_bit+0x107/0x130 [ 1911.107814][T16202] pcpu_alloc+0xd5b/0x1380 [ 1911.112226][T16202] ? pcpu_alloc_area+0x820/0x820 [ 1911.117167][T16202] __alloc_percpu_gfp+0x28/0x30 [ 1911.122018][T16202] array_map_alloc+0x698/0x7d0 [ 1911.126772][T16202] ? array_of_map_free+0x50/0x50 [ 1911.131714][T16202] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.137964][T16202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.144197][T16202] ? array_of_map_free+0x50/0x50 [ 1911.149124][T16202] __do_sys_bpf+0x478/0x3810 [ 1911.153701][T16202] ? bpf_prog_load+0x18f0/0x18f0 [ 1911.158720][T16202] ? __kasan_check_write+0x14/0x20 [ 1911.163820][T16202] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1911.169412][T16202] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1911.174754][T16202] ? wait_for_completion+0x440/0x440 [ 1911.180063][T16202] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1911.186305][T16202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1911.191766][T16202] ? do_syscall_64+0x26/0x790 [ 1911.196449][T16202] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1911.202527][T16202] ? do_syscall_64+0x26/0x790 [ 1911.207513][T16202] __x64_sys_bpf+0x73/0xb0 [ 1911.211979][T16202] do_syscall_64+0xfa/0x790 [ 1911.216480][T16202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1911.222375][T16202] RIP: 0033:0x45a919 [ 1911.226261][T16202] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1911.245854][T16202] RSP: 002b:00007ffb4df7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1911.254253][T16202] RAX: ffffffffffffffda RBX: 00007ffb4df7bc90 RCX: 000000000045a919 [ 1911.262295][T16202] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1911.270270][T16202] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 22:45:57 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) [ 1911.278313][T16202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df7c6d4 [ 1911.286284][T16202] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:57 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) socket$kcm(0x10, 0x2, 0x0) 22:45:57 executing program 2 (fault-call:4 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1911.454609][T16214] FAULT_INJECTION: forcing a failure. [ 1911.454609][T16214] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1911.475537][T16214] CPU: 1 PID: 16214 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1911.484247][T16214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.494313][T16214] Call Trace: [ 1911.497653][T16214] dump_stack+0x197/0x210 [ 1911.502012][T16214] should_fail.cold+0xa/0x15 [ 1911.506638][T16214] ? fault_create_debugfs_attr+0x180/0x180 [ 1911.513111][T16214] ? ___might_sleep+0x163/0x2c0 [ 1911.518068][T16214] should_fail_alloc_page+0x50/0x60 [ 1911.523319][T16214] __alloc_pages_nodemask+0x1a1/0x910 [ 1911.528695][T16214] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1911.534420][T16214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.540822][T16214] ? find_next_bit+0x107/0x130 [ 1911.545596][T16214] pcpu_populate_chunk+0xf8/0x940 [ 1911.550605][T16214] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1911.556312][T16214] ? find_next_bit+0x107/0x130 [ 1911.561128][T16214] pcpu_alloc+0xd5b/0x1380 [ 1911.565537][T16214] ? pcpu_alloc_area+0x820/0x820 [ 1911.570587][T16214] __alloc_percpu_gfp+0x28/0x30 [ 1911.575451][T16214] array_map_alloc+0x698/0x7d0 [ 1911.580206][T16214] ? array_of_map_free+0x50/0x50 [ 1911.585134][T16214] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1911.591381][T16214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1911.597629][T16214] ? array_of_map_free+0x50/0x50 [ 1911.602552][T16214] __do_sys_bpf+0x478/0x3810 [ 1911.607139][T16214] ? bpf_prog_load+0x18f0/0x18f0 [ 1911.612078][T16214] ? __kasan_check_write+0x14/0x20 [ 1911.617209][T16214] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1911.622786][T16214] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1911.628062][T16214] ? wait_for_completion+0x440/0x440 [ 1911.633347][T16214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1911.639600][T16214] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1911.645053][T16214] ? do_syscall_64+0x26/0x790 [ 1911.649714][T16214] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1911.655772][T16214] ? do_syscall_64+0x26/0x790 [ 1911.660486][T16214] __x64_sys_bpf+0x73/0xb0 [ 1911.664892][T16214] do_syscall_64+0xfa/0x790 [ 1911.669383][T16214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1911.675275][T16214] RIP: 0033:0x45a919 [ 1911.679276][T16214] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1911.698912][T16214] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1911.707307][T16214] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1911.715521][T16214] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1911.723486][T16214] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1911.731442][T16214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1911.740547][T16214] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:57 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0045878, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8949, &(0x7f00000001c0)='bond0\x00') recvmsg$kcm(r3, &(0x7f0000000600)={&(0x7f0000000140)=@alg, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)}], 0x1, &(0x7f0000000480)}, 0x40000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r2, 0x14, 0x1}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0045878, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x18, 0x7, 0x1, 0x9, 0x4, r1, 0x5, [], 0x0, r4, 0x1, 0x2}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000340)="c8196cd38e662efcb175f674ee63de48b4bb86cd9b6f5ddd0029ba088d0a2ec925b48b9a42abd91ff4367d1a84ef32aa4235a80ea49d0bc0188e33dc625d53910258fe936b07b578fdc3c328c6984f9774cf7464198230b27b0bf805fed0e69c2bf45296f17adea5ace1c97530d1fba35b658f42a225511938ef309ad51b73e2c711555e2fb33b3ea721000f357313285c7b7442ec6ad9c9b9c3b0f2f531da5f0bd5f17009ee95367abacf6c12684c0366945493b481a16cffab086074eb70e228112c3a40aad7c7470d10e15faae8913e24d583441b0fe1b6a5"}, 0x20) 22:45:57 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) r4 = gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r7) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r8, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x70, 0x1, 0x9, 0x6, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_config_ext={0x8, 0x51}, 0x8000, 0x7, 0xfff, 0x6, 0x0, 0x400, 0x1}, r4, 0x7, r8, 0x9) 22:45:57 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x8bf073849a91b3a6, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) [ 1911.766566][T16219] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1911.796533][T16219] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:58 executing program 2 (fault-call:4 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) close(r0) 22:45:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) [ 1911.990685][T16233] FAULT_INJECTION: forcing a failure. [ 1911.990685][T16233] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1912.027067][T16233] CPU: 0 PID: 16233 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1912.035879][T16233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1912.045948][T16233] Call Trace: [ 1912.049262][T16233] dump_stack+0x197/0x210 [ 1912.054059][T16233] should_fail.cold+0xa/0x15 [ 1912.058668][T16233] ? fault_create_debugfs_attr+0x180/0x180 [ 1912.064496][T16233] ? ___might_sleep+0x163/0x2c0 [ 1912.069373][T16233] should_fail_alloc_page+0x50/0x60 [ 1912.074566][T16233] __alloc_pages_nodemask+0x1a1/0x910 [ 1912.074661][T16233] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1912.074690][T16233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.074705][T16233] ? find_next_bit+0x107/0x130 [ 1912.074729][T16233] pcpu_populate_chunk+0xf8/0x940 [ 1912.074741][T16233] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1912.074759][T16233] ? find_next_bit+0x107/0x130 [ 1912.112313][T16233] pcpu_alloc+0xd5b/0x1380 [ 1912.116765][T16233] ? pcpu_alloc_area+0x820/0x820 [ 1912.121737][T16233] __alloc_percpu_gfp+0x28/0x30 [ 1912.126618][T16233] array_map_alloc+0x698/0x7d0 [ 1912.131413][T16233] ? array_of_map_free+0x50/0x50 [ 1912.136390][T16233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.142653][T16233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.148929][T16233] ? array_of_map_free+0x50/0x50 [ 1912.153898][T16233] __do_sys_bpf+0x478/0x3810 [ 1912.158519][T16233] ? bpf_prog_load+0x18f0/0x18f0 [ 1912.163478][T16233] ? __kasan_check_write+0x14/0x20 [ 1912.168593][T16233] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1912.174169][T16233] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1912.179477][T16233] ? wait_for_completion+0x440/0x440 [ 1912.184797][T16233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1912.191085][T16233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1912.196565][T16233] ? do_syscall_64+0x26/0x790 [ 1912.201265][T16233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.207350][T16233] ? do_syscall_64+0x26/0x790 [ 1912.212034][T16233] __x64_sys_bpf+0x73/0xb0 [ 1912.216475][T16233] do_syscall_64+0xfa/0x790 [ 1912.220995][T16233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.226895][T16233] RIP: 0033:0x45a919 [ 1912.230804][T16233] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1912.251303][T16233] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1912.259737][T16233] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1912.267719][T16233] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1912.275808][T16233] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1912.283873][T16233] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1912.291847][T16233] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:58 executing program 2 (fault-call:4 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:58 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r2, 0x4) [ 1912.395964][T16244] FAULT_INJECTION: forcing a failure. [ 1912.395964][T16244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1912.410457][T16244] CPU: 0 PID: 16244 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1912.419157][T16244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1912.429231][T16244] Call Trace: [ 1912.429258][T16244] dump_stack+0x197/0x210 [ 1912.429286][T16244] should_fail.cold+0xa/0x15 [ 1912.429312][T16244] ? fault_create_debugfs_attr+0x180/0x180 [ 1912.447737][T16244] ? ___might_sleep+0x163/0x2c0 [ 1912.452624][T16244] should_fail_alloc_page+0x50/0x60 [ 1912.457840][T16244] __alloc_pages_nodemask+0x1a1/0x910 [ 1912.463238][T16244] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1912.468988][T16244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.475252][T16244] ? find_next_bit+0x107/0x130 [ 1912.480571][T16244] pcpu_populate_chunk+0xf8/0x940 [ 1912.485628][T16244] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1912.491370][T16244] ? find_next_bit+0x107/0x130 [ 1912.496178][T16244] pcpu_alloc+0xd5b/0x1380 [ 1912.500695][T16244] ? pcpu_alloc_area+0x820/0x820 [ 1912.505696][T16244] __alloc_percpu_gfp+0x28/0x30 [ 1912.510573][T16244] array_map_alloc+0x698/0x7d0 [ 1912.515383][T16244] ? array_of_map_free+0x50/0x50 [ 1912.520524][T16244] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.526768][T16244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.533102][T16244] ? array_of_map_free+0x50/0x50 [ 1912.538070][T16244] __do_sys_bpf+0x478/0x3810 [ 1912.542765][T16244] ? bpf_prog_load+0x18f0/0x18f0 [ 1912.548755][T16244] ? __kasan_check_write+0x14/0x20 [ 1912.553869][T16244] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1912.559433][T16244] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1912.564735][T16244] ? wait_for_completion+0x440/0x440 [ 1912.570028][T16244] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1912.576289][T16244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1912.581757][T16244] ? do_syscall_64+0x26/0x790 [ 1912.586460][T16244] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.592527][T16244] ? do_syscall_64+0x26/0x790 [ 1912.597214][T16244] __x64_sys_bpf+0x73/0xb0 [ 1912.601643][T16244] do_syscall_64+0xfa/0x790 [ 1912.606156][T16244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.612045][T16244] RIP: 0033:0x45a919 [ 1912.615935][T16244] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1912.635637][T16244] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1912.644052][T16244] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1912.652030][T16244] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1912.659989][T16244] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1912.667974][T16244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1912.676211][T16244] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 1912.688267][T16249] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 22:45:58 executing program 2 (fault-call:4 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1912.705859][T16249] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1912.759068][T16255] FAULT_INJECTION: forcing a failure. [ 1912.759068][T16255] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1912.778832][T16255] CPU: 0 PID: 16255 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1912.787547][T16255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1912.797614][T16255] Call Trace: [ 1912.797641][T16255] dump_stack+0x197/0x210 [ 1912.797668][T16255] should_fail.cold+0xa/0x15 [ 1912.797693][T16255] ? fault_create_debugfs_attr+0x180/0x180 [ 1912.797710][T16255] ? ___might_sleep+0x163/0x2c0 [ 1912.797742][T16255] should_fail_alloc_page+0x50/0x60 [ 1912.797757][T16255] __alloc_pages_nodemask+0x1a1/0x910 [ 1912.797779][T16255] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1912.836828][T16255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.843678][T16255] ? find_next_bit+0x107/0x130 [ 1912.848452][T16255] pcpu_populate_chunk+0xf8/0x940 [ 1912.853578][T16255] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1912.859311][T16255] ? find_next_bit+0x107/0x130 [ 1912.864086][T16255] pcpu_alloc+0xd5b/0x1380 [ 1912.868515][T16255] ? pcpu_alloc_area+0x820/0x820 [ 1912.873463][T16255] __alloc_percpu_gfp+0x28/0x30 [ 1912.878310][T16255] array_map_alloc+0x698/0x7d0 [ 1912.883071][T16255] ? array_of_map_free+0x50/0x50 [ 1912.888002][T16255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1912.894235][T16255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.900468][T16255] ? array_of_map_free+0x50/0x50 [ 1912.905400][T16255] __do_sys_bpf+0x478/0x3810 [ 1912.909987][T16255] ? bpf_prog_load+0x18f0/0x18f0 [ 1912.914919][T16255] ? __kasan_check_write+0x14/0x20 [ 1912.920024][T16255] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1912.925561][T16255] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1912.930851][T16255] ? wait_for_completion+0x440/0x440 [ 1912.936492][T16255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1912.943008][T16255] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1912.948457][T16255] ? do_syscall_64+0x26/0x790 [ 1912.953122][T16255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.959190][T16255] ? do_syscall_64+0x26/0x790 [ 1912.963874][T16255] __x64_sys_bpf+0x73/0xb0 [ 1912.968285][T16255] do_syscall_64+0xfa/0x790 [ 1912.972784][T16255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.978666][T16255] RIP: 0033:0x45a919 [ 1912.982557][T16255] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:45:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) [ 1913.002158][T16255] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1913.010646][T16255] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1913.018636][T16255] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1913.026608][T16255] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1913.034693][T16255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1913.042664][T16255] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:59 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r3) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r3) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r4, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r6) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r1, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000004800)={0x8, 0xa, &(0x7f0000000280)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r2}, @jmp={0x5, 0x1, 0x6, 0xa, 0xe, 0xc, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x6, 0xd, 0x9, 0xfffffffffffffff4, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x0, 0x8, 0x5, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x0, 0x0, 0x1, 0x3, 0x8, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map={0x18, 0x8, 0x1, 0x0, r3}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000400)=""/131, 0x1f00, 0x2, [], r5, 0xca451d872c257773, r6, 0x8, &(0x7f00000046c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004700)={0x0, 0x10, 0x6, 0xe}, 0x10, r7, r8}, 0x78) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000280)=@ll={0x11, 0x1b, r5, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000600)="ecd65023669627fedd1018dcf8a3604d92710c1b13ed01d372992b60a82c850a3568dd392948fac4125e435c0589247bbcd50414e04cf4e18bd3df3810d23f837b08fb7da8e0651026d3634a51225fe215893eef0a0b398ddbafe1f6345f6d2ae6ee4f80f408274b7e06cd211165d204a86836b342911bbe2029f6fc56383fb76da448d3180d571726ee0411a7f02cff64e237edc72df0433c4cfbebfcf0260d065ee78bb33fb98b11062bec7f4ad4c5ff8f672c834c743f2fc8649c647625ca7fd5d5d4c354d8a39bbbde6679909934d47acd84418606366ab99f563edc36b441735811ac0d41ec8cd7d28e548882663da811ff5ff3c00dff", 0xf9}, {&(0x7f0000000700)="0eae2e200a046c2749da7fb9d25de16ae48de4fb66beb345b05889d1f6b34cf50dc336ebd382750de0eb99452803138267586960df97876c87ba6947073b51664c6acaafd90b508ca8ea8d3f1f6f282afaf3ab3d93e80a51f64466508c7e7abd1615bf516e46ff6a01f89efcd394f69c3e78da163adcc9788a79f1944c11ab5fba721604f08022d5bdcc2f7287750ba60301158e83e7b04c99b69c3b33e5b87a5f64d529cd8297ae70de626f90593c54364edca89b580dacdef2d4489402907478272bb7cd68140961553d04b7", 0xcd}, {&(0x7f0000000300)}], 0x3, &(0x7f00000009c0)=[{0xb0, 0x3f, 0x200, "ffcd2659400edf7ee5d4daa4167cdf6d8e0431b5c3db612ecbd0dc6f4a0cd00cc93e1158002cf812bb024a3868dce9cc3eee03a105782f66e1dd0661fa9b7ee5d4f382035fe22bf44593f1b61f115045e24c229103031961fcc436181ec0446c89fbf9c11138084410c69ec4ecf5c2ce611f494363324fe54795e89ded9714e40c70e71e434460a45b7261776251c37b62125803cc1096fef5"}, {0x10, 0x111, 0x3}, {0xf0, 0x119, 0x40, "f4950221b2adbb4566ad1c78428590977f64582dffc6c30f972f099cbf47ebb30b72a2b9aa6c3d1f725071b3a479c297ead902b4063d524f6223a1d94b2bd320041b569b7c135e2dae89e4228df1e7ad6e51c4c7fd0cd3bb607ed2b330b2c7e75487c7fb179d7d5bda69e2c501b21ddac7f84143eb41d5e28d1b4b1ab134499b37394c8a859830f45cae20787003e8b1bfa10242dc44a1340ecd5b6e9f95ce154b69167a8939c99bcb4b8470276b6085a8568e59637e90daebef504db87f5b69556be9efbace115366111e74cde4f7fa2ef5aaf9c9fd3590304f"}, {0x1010, 0x104, 0x7e39, "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"}, {0xe8, 0x2ab, 0x80, "a3d972d33b4e419b3a0b8da3b18bbd6f4269b14d83b3eb215702e20a1aea1eadbcd3fc216ce714b8e88d8b1660aa4480ebd7b802324d3203237216ff027e636e5452ee3b1dd6b4aeac4f8fa8a6cd6ac25eb2f83a2260b47f522d476cd0e20158573497486ba0d01997aa0a2ec5a8151758e181723dffd94fd640b63b17586d484154caf7cf498339fb40451ba4511daa6b53044b834f4ca4aac1f3ca03af904c65a474657845b2956cd5ec777dd882df6d6f89cfeb5efe63d3eda7c356dfc9f7d32b92fb757a8753dbd7e88bbfa56b20186c5a9d"}, {0x28, 0x109, 0x80000000, "2b8f0b7a12f3a3c7e99c1ff80405985aa54c03d12600e7"}, {0x18, 0x10e, 0x7f, "1b88"}, {0x18, 0x10c, 0x760c, "3a0594"}, {0xd0, 0x11, 0x9, "50c288f8bb6770486b17e706542e885c34aaedcb2ef10a54d25efbf2e60053fd0c39c408a1e6c8c81458262dc413622bbc5676ded763e9f7febe242e356c1b541f179b6727f07f86aa652bc0014c859a617aaa10477e4883040043e6b0414458b8118c1b9f77c6afb15839630aaec536a2db11f0de4a57a74e952f73d999980f2d342dd19c4945afd050ce8cb8ac9b27ea99e4d283963826c2a1297a1ccf1772247aae8e0046b6db6164512d8657b08a1bd64e7034623a5bcbbfba8918e2"}, {0x40, 0x11, 0x8, "c76049441ff8c5151a34909643bd4ea6d89ef1069c2bd8d11d328196b160e5031b3bd6a73d0735757470223affaaf9"}], 0x1410}, 0x8810) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) r9 = socket$kcm(0x2, 0x200000000000001, 0x0) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$sock_attach_bpf(r9, 0x1, 0x3e, &(0x7f0000000040)=r10, 0xab) sendmsg(r9, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r12, 0xb}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r11, 0x18}, 0x10) 22:45:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') 22:45:59 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="026d256e00027920"], 0xda00) 22:45:59 executing program 2 (fault-call:4 fault-nth:7): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:45:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) [ 1913.412767][T16273] FAULT_INJECTION: forcing a failure. [ 1913.412767][T16273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1913.431982][T16273] CPU: 0 PID: 16273 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1913.440690][T16273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.450748][T16273] Call Trace: [ 1913.454061][T16273] dump_stack+0x197/0x210 [ 1913.458415][T16273] should_fail.cold+0xa/0x15 [ 1913.463014][T16273] ? fault_create_debugfs_attr+0x180/0x180 [ 1913.468822][T16273] ? ___might_sleep+0x163/0x2c0 [ 1913.473702][T16273] should_fail_alloc_page+0x50/0x60 [ 1913.475706][T16279] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1913.478906][T16273] __alloc_pages_nodemask+0x1a1/0x910 [ 1913.478935][T16273] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1913.498189][T16273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1913.501140][T16279] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:45:59 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) [ 1913.504462][T16273] ? find_next_bit+0x107/0x130 [ 1913.504490][T16273] pcpu_populate_chunk+0xf8/0x940 [ 1913.504507][T16273] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1913.504520][T16273] ? find_next_bit+0x107/0x130 [ 1913.504542][T16273] pcpu_alloc+0xd5b/0x1380 [ 1913.504569][T16273] ? pcpu_alloc_area+0x820/0x820 [ 1913.504598][T16273] __alloc_percpu_gfp+0x28/0x30 [ 1913.504617][T16273] array_map_alloc+0x698/0x7d0 [ 1913.504639][T16273] ? array_of_map_free+0x50/0x50 [ 1913.504659][T16273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1913.504674][T16273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.504691][T16273] ? array_of_map_free+0x50/0x50 [ 1913.504707][T16273] __do_sys_bpf+0x478/0x3810 [ 1913.504729][T16273] ? bpf_prog_load+0x18f0/0x18f0 [ 1913.533018][T16273] ? __kasan_check_write+0x14/0x20 [ 1913.547181][T16273] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1913.547201][T16273] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1913.547222][T16273] ? wait_for_completion+0x440/0x440 [ 1913.547250][T16273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1913.547281][T16273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.616697][T16273] ? do_syscall_64+0x26/0x790 [ 1913.621387][T16273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1913.627467][T16273] ? do_syscall_64+0x26/0x790 [ 1913.632165][T16273] __x64_sys_bpf+0x73/0xb0 [ 1913.636606][T16273] do_syscall_64+0xfa/0x790 [ 1913.641098][T16273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1913.646979][T16273] RIP: 0033:0x45a919 [ 1913.650876][T16273] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1913.670604][T16273] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1913.679018][T16273] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1913.686984][T16273] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1913.694984][T16273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1913.702957][T16273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1913.711362][T16273] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:45:59 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) 22:45:59 executing program 2 (fault-call:4 fault-nth:8): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1913.829967][T16290] FAULT_INJECTION: forcing a failure. [ 1913.829967][T16290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1913.854768][T16290] CPU: 0 PID: 16290 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1913.863481][T16290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.873548][T16290] Call Trace: 22:46:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) [ 1913.876864][T16290] dump_stack+0x197/0x210 [ 1913.881207][T16290] should_fail.cold+0xa/0x15 [ 1913.885812][T16290] ? fault_create_debugfs_attr+0x180/0x180 [ 1913.891633][T16290] ? ___might_sleep+0x163/0x2c0 [ 1913.896516][T16290] should_fail_alloc_page+0x50/0x60 [ 1913.901730][T16290] __alloc_pages_nodemask+0x1a1/0x910 [ 1913.907118][T16290] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1913.912844][T16290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1913.919098][T16290] ? find_next_bit+0x107/0x130 [ 1913.923881][T16290] pcpu_populate_chunk+0xf8/0x940 [ 1913.928916][T16290] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1913.934642][T16290] ? find_next_bit+0x107/0x130 [ 1913.939799][T16290] pcpu_alloc+0xd5b/0x1380 [ 1913.944245][T16290] ? pcpu_alloc_area+0x820/0x820 [ 1913.949301][T16290] __alloc_percpu_gfp+0x28/0x30 [ 1913.954173][T16290] array_map_alloc+0x698/0x7d0 [ 1913.958961][T16290] ? array_of_map_free+0x50/0x50 [ 1913.964035][T16290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1913.970287][T16290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.976572][T16290] ? array_of_map_free+0x50/0x50 [ 1913.981530][T16290] __do_sys_bpf+0x478/0x3810 [ 1913.986146][T16290] ? bpf_prog_load+0x18f0/0x18f0 [ 1913.991096][T16290] ? __kasan_check_write+0x14/0x20 [ 1913.996223][T16290] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1914.001805][T16290] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1914.007111][T16290] ? wait_for_completion+0x440/0x440 [ 1914.012411][T16290] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1914.018658][T16290] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.024120][T16290] ? do_syscall_64+0x26/0x790 [ 1914.028811][T16290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.034889][T16290] ? do_syscall_64+0x26/0x790 [ 1914.039574][T16290] __x64_sys_bpf+0x73/0xb0 [ 1914.043982][T16290] do_syscall_64+0xfa/0x790 [ 1914.048478][T16290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.054386][T16290] RIP: 0033:0x45a919 [ 1914.058314][T16290] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1914.077928][T16290] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1914.086353][T16290] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1914.094338][T16290] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1914.102354][T16290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1914.110394][T16290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1914.118373][T16290] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:00 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000840)='r\x7f\x00a.current\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r3 = openat$cgroup_ro(r1, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 22:46:00 executing program 2 (fault-call:4 fault-nth:9): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1914.228735][T16304] FAULT_INJECTION: forcing a failure. [ 1914.228735][T16304] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1914.246223][T16307] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1914.263441][T16304] CPU: 1 PID: 16304 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1914.272159][T16304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1914.282229][T16304] Call Trace: [ 1914.285539][T16304] dump_stack+0x197/0x210 [ 1914.289894][T16304] should_fail.cold+0xa/0x15 [ 1914.292820][T16307] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1914.294499][T16304] ? fault_create_debugfs_attr+0x180/0x180 [ 1914.294517][T16304] ? ___might_sleep+0x163/0x2c0 [ 1914.294543][T16304] should_fail_alloc_page+0x50/0x60 [ 1914.294558][T16304] __alloc_pages_nodemask+0x1a1/0x910 [ 1914.294576][T16304] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1914.294600][T16304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1914.335757][T16304] ? find_next_bit+0x107/0x130 [ 1914.340526][T16304] pcpu_populate_chunk+0xf8/0x940 [ 1914.345543][T16304] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1914.351273][T16304] ? find_next_bit+0x107/0x130 [ 1914.356055][T16304] pcpu_alloc+0xd5b/0x1380 [ 1914.360468][T16304] ? pcpu_alloc_area+0x820/0x820 [ 1914.365411][T16304] __alloc_percpu_gfp+0x28/0x30 [ 1914.370251][T16304] array_map_alloc+0x698/0x7d0 [ 1914.375037][T16304] ? array_of_map_free+0x50/0x50 [ 1914.379978][T16304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1914.386215][T16304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.392449][T16304] ? array_of_map_free+0x50/0x50 [ 1914.397379][T16304] __do_sys_bpf+0x478/0x3810 [ 1914.401962][T16304] ? bpf_prog_load+0x18f0/0x18f0 [ 1914.406994][T16304] ? __kasan_check_write+0x14/0x20 [ 1914.412156][T16304] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1914.417814][T16304] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1914.423144][T16304] ? wait_for_completion+0x440/0x440 [ 1914.428449][T16304] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1914.434687][T16304] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.440135][T16304] ? do_syscall_64+0x26/0x790 [ 1914.444797][T16304] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.450934][T16304] ? do_syscall_64+0x26/0x790 [ 1914.455625][T16304] __x64_sys_bpf+0x73/0xb0 [ 1914.460050][T16304] do_syscall_64+0xfa/0x790 [ 1914.464563][T16304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.470446][T16304] RIP: 0033:0x45a919 [ 1914.474341][T16304] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1914.493953][T16304] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1914.502806][T16304] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1914.510763][T16304] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1914.518733][T16304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:46:00 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/>', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x600400, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3da, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a001500ac14142603000e12050000000000812fa8000800a4001000e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'netdevsim0\x00', 0x2000}) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:00 executing program 2 (fault-call:4 fault-nth:10): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1914.526700][T16304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1914.534655][T16304] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:00 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8949, &(0x7f00000001c0)='bond0\x00') [ 1914.708237][T16316] FAULT_INJECTION: forcing a failure. [ 1914.708237][T16316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1914.783071][T16316] CPU: 0 PID: 16316 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1914.791807][T16316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1914.801894][T16316] Call Trace: [ 1914.801925][T16316] dump_stack+0x197/0x210 [ 1914.801950][T16316] should_fail.cold+0xa/0x15 [ 1914.801972][T16316] ? fault_create_debugfs_attr+0x180/0x180 [ 1914.801993][T16316] ? ___might_sleep+0x163/0x2c0 [ 1914.825229][T16316] should_fail_alloc_page+0x50/0x60 [ 1914.825244][T16316] __alloc_pages_nodemask+0x1a1/0x910 [ 1914.825263][T16316] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1914.825287][T16316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1914.825301][T16316] ? find_next_bit+0x107/0x130 [ 1914.825323][T16316] pcpu_populate_chunk+0xf8/0x940 [ 1914.825336][T16316] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1914.825355][T16316] ? find_next_bit+0x107/0x130 [ 1914.868152][T16316] pcpu_alloc+0xd5b/0x1380 [ 1914.872608][T16316] ? pcpu_alloc_area+0x820/0x820 [ 1914.877585][T16316] __alloc_percpu_gfp+0x28/0x30 [ 1914.882449][T16316] array_map_alloc+0x698/0x7d0 [ 1914.887294][T16316] ? array_of_map_free+0x50/0x50 [ 1914.892228][T16316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1914.898466][T16316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.904720][T16316] ? array_of_map_free+0x50/0x50 [ 1914.909662][T16316] __do_sys_bpf+0x478/0x3810 [ 1914.914255][T16316] ? bpf_prog_load+0x18f0/0x18f0 [ 1914.919186][T16316] ? __kasan_check_write+0x14/0x20 [ 1914.924287][T16316] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1914.929820][T16316] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1914.935119][T16316] ? wait_for_completion+0x440/0x440 [ 1914.940407][T16316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1914.946848][T16316] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.952320][T16316] ? do_syscall_64+0x26/0x790 [ 1914.956998][T16316] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.963074][T16316] ? do_syscall_64+0x26/0x790 [ 1914.967756][T16316] __x64_sys_bpf+0x73/0xb0 [ 1914.972189][T16316] do_syscall_64+0xfa/0x790 [ 1914.976694][T16316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.982574][T16316] RIP: 0033:0x45a919 [ 1914.986467][T16316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1915.006184][T16316] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1915.014601][T16316] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1915.022932][T16316] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 22:46:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], 0xda00) 22:46:01 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) 22:46:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) [ 1915.030906][T16316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1915.038876][T16316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1915.047073][T16316] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:01 executing program 2 (fault-call:4 fault-nth:11): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1915.180263][T16332] FAULT_INJECTION: forcing a failure. [ 1915.180263][T16332] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1915.193609][T16332] CPU: 1 PID: 16332 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1915.202293][T16332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1915.212478][T16332] Call Trace: [ 1915.215845][T16332] dump_stack+0x197/0x210 [ 1915.220206][T16332] should_fail.cold+0xa/0x15 [ 1915.224862][T16332] ? fault_create_debugfs_attr+0x180/0x180 [ 1915.230813][T16332] ? ___might_sleep+0x163/0x2c0 [ 1915.235773][T16332] should_fail_alloc_page+0x50/0x60 [ 1915.240967][T16332] __alloc_pages_nodemask+0x1a1/0x910 [ 1915.246353][T16332] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1915.252067][T16332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1915.258308][T16332] ? find_next_bit+0x107/0x130 [ 1915.263163][T16332] pcpu_populate_chunk+0xf8/0x940 [ 1915.268175][T16332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1915.273909][T16332] ? find_next_bit+0x107/0x130 [ 1915.278691][T16332] pcpu_alloc+0xd5b/0x1380 [ 1915.283111][T16332] ? pcpu_alloc_area+0x820/0x820 [ 1915.288070][T16332] __alloc_percpu_gfp+0x28/0x30 [ 1915.292919][T16332] array_map_alloc+0x698/0x7d0 [ 1915.297671][T16332] ? array_of_map_free+0x50/0x50 [ 1915.302612][T16332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1915.308852][T16332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.315095][T16332] ? array_of_map_free+0x50/0x50 [ 1915.320135][T16332] __do_sys_bpf+0x478/0x3810 [ 1915.324802][T16332] ? bpf_prog_load+0x18f0/0x18f0 [ 1915.329751][T16332] ? __kasan_check_write+0x14/0x20 [ 1915.334865][T16332] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1915.340408][T16332] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1915.345682][T16332] ? wait_for_completion+0x440/0x440 [ 1915.350972][T16332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1915.357214][T16332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1915.362674][T16332] ? do_syscall_64+0x26/0x790 [ 1915.367351][T16332] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1915.373421][T16332] ? do_syscall_64+0x26/0x790 [ 1915.378239][T16332] __x64_sys_bpf+0x73/0xb0 [ 1915.382666][T16332] do_syscall_64+0xfa/0x790 [ 1915.387171][T16332] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1915.393406][T16332] RIP: 0033:0x45a919 [ 1915.397293][T16332] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1915.416889][T16332] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 22:46:01 executing program 2 (fault-call:4 fault-nth:12): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1915.425327][T16332] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1915.433301][T16332] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1915.441288][T16332] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1915.449275][T16332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1915.457263][T16332] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:01 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) 22:46:01 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\f\x8d\xd0\x8eK\x99\xc2I+\xaf\xacu\nm\\\xe2y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba\x01\x00\x00\x00J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xd2{\xaf\x9a\x1e3\xc1\x83&\x89\xd2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xda\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\xf2\x1e\x8e\xd4\xd0er\x01\xe3\xe1\xd4\x1f\xbb q\xfa\xc9HNb\xb7\xdb\xbfJG;\xd9\x98\xdf\f\xfb\x19FT\x9e[\xd7\xa3\xfe\x19\tV\xbf\x17\xf6W\x11m\x17\x9dwR\xcc5\xed\xbe\x04}\xa0- \x10\xef\xd3\x87\x80\xce\xb9\xe4\x9c.\xf8\x93\x88\xff|\x8d\x16\x9a\x80\xf2sI\"Q\x03%\xdf\x88\xf4\xc6\xb3i}=\xcbi$\x9e,=K!\x15\xbc\x94\xee\v[Q\xbe\xb8\x1fH\x8b', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) socket$kcm(0x29, 0xa, 0x0) [ 1915.599338][T16340] FAULT_INJECTION: forcing a failure. [ 1915.599338][T16340] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1915.644446][T16340] CPU: 0 PID: 16340 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1915.653171][T16340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1915.663325][T16340] Call Trace: [ 1915.666643][T16340] dump_stack+0x197/0x210 [ 1915.671001][T16340] should_fail.cold+0xa/0x15 [ 1915.675624][T16340] ? fault_create_debugfs_attr+0x180/0x180 [ 1915.681453][T16340] ? ___might_sleep+0x163/0x2c0 [ 1915.686340][T16340] should_fail_alloc_page+0x50/0x60 [ 1915.691562][T16340] __alloc_pages_nodemask+0x1a1/0x910 [ 1915.696965][T16340] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1915.702695][T16340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1915.708930][T16340] ? find_next_bit+0x107/0x130 [ 1915.713795][T16340] pcpu_populate_chunk+0xf8/0x940 [ 1915.718831][T16340] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1915.724563][T16340] ? find_next_bit+0x107/0x130 [ 1915.729341][T16340] pcpu_alloc+0xd5b/0x1380 [ 1915.733770][T16340] ? pcpu_alloc_area+0x820/0x820 [ 1915.738731][T16340] __alloc_percpu_gfp+0x28/0x30 [ 1915.743603][T16340] array_map_alloc+0x698/0x7d0 [ 1915.748395][T16340] ? array_of_map_free+0x50/0x50 [ 1915.753338][T16340] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1915.759568][T16340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1915.765828][T16340] ? array_of_map_free+0x50/0x50 [ 1915.770787][T16340] __do_sys_bpf+0x478/0x3810 [ 1915.775386][T16340] ? bpf_prog_load+0x18f0/0x18f0 [ 1915.780324][T16340] ? __kasan_check_write+0x14/0x20 [ 1915.785436][T16340] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1915.790981][T16340] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1915.796273][T16340] ? wait_for_completion+0x440/0x440 [ 1915.801587][T16340] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1915.807844][T16340] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1915.813435][T16340] ? do_syscall_64+0x26/0x790 [ 1915.818135][T16340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1915.824262][T16340] ? do_syscall_64+0x26/0x790 [ 1915.828991][T16340] __x64_sys_bpf+0x73/0xb0 [ 1915.833401][T16340] do_syscall_64+0xfa/0x790 [ 1915.837921][T16340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1915.843863][T16340] RIP: 0033:0x45a919 [ 1915.847763][T16340] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1915.867418][T16340] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1915.875837][T16340] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1915.883822][T16340] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 22:46:02 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfff}, 0x10164, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r1 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x0, 0x0, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0xa, @perf_bp={0x0, 0x2}, 0x20000, 0x8e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r1, 0x0, r0, 0x9) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040)=0x8, 0x12) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="006d256d000279200eef9dbf50c09e59090f91d2"], 0xda00) [ 1915.891785][T16340] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1915.899761][T16340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1915.907748][T16340] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:02 executing program 2 (fault-call:4 fault-nth:13): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:02 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) [ 1916.078162][T16357] FAULT_INJECTION: forcing a failure. [ 1916.078162][T16357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1916.104651][T16357] CPU: 0 PID: 16357 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1916.113370][T16357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1916.123430][T16357] Call Trace: [ 1916.123457][T16357] dump_stack+0x197/0x210 [ 1916.123481][T16357] should_fail.cold+0xa/0x15 [ 1916.123504][T16357] ? fault_create_debugfs_attr+0x180/0x180 [ 1916.123521][T16357] ? ___might_sleep+0x163/0x2c0 [ 1916.123551][T16357] should_fail_alloc_page+0x50/0x60 [ 1916.123564][T16357] __alloc_pages_nodemask+0x1a1/0x910 [ 1916.123583][T16357] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1916.123607][T16357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1916.162665][T16357] ? find_next_bit+0x107/0x130 [ 1916.162691][T16357] pcpu_populate_chunk+0xf8/0x940 22:46:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) [ 1916.162712][T16357] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1916.184431][T16357] ? find_next_bit+0x107/0x130 [ 1916.189222][T16357] pcpu_alloc+0xd5b/0x1380 [ 1916.193670][T16357] ? pcpu_alloc_area+0x820/0x820 [ 1916.198641][T16357] __alloc_percpu_gfp+0x28/0x30 [ 1916.203510][T16357] array_map_alloc+0x698/0x7d0 [ 1916.208297][T16357] ? array_of_map_free+0x50/0x50 [ 1916.213263][T16357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1916.219574][T16357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.225818][T16357] ? array_of_map_free+0x50/0x50 [ 1916.230759][T16357] __do_sys_bpf+0x478/0x3810 [ 1916.235387][T16357] ? bpf_prog_load+0x18f0/0x18f0 [ 1916.240329][T16357] ? __kasan_check_write+0x14/0x20 [ 1916.245464][T16357] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1916.251008][T16357] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1916.256302][T16357] ? wait_for_completion+0x440/0x440 [ 1916.261621][T16357] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1916.267887][T16357] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1916.273435][T16357] ? do_syscall_64+0x26/0x790 [ 1916.278126][T16357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1916.284191][T16357] ? do_syscall_64+0x26/0x790 [ 1916.288869][T16357] __x64_sys_bpf+0x73/0xb0 [ 1916.293421][T16357] do_syscall_64+0xfa/0x790 [ 1916.297940][T16357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1916.303832][T16357] RIP: 0033:0x45a919 [ 1916.307712][T16357] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1916.327302][T16357] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1916.335708][T16357] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1916.343676][T16357] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1916.351651][T16357] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1916.359610][T16357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1916.367578][T16357] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:02 executing program 2 (fault-call:4 fault-nth:14): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:02 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="74132f0a5f8ab6d642bf3c345a3bb74e990b7edc8b6a24da03196a0c6d1dddd87e642751423e2891a99b04f0b2d438b46f08487e13050807c3d7ff33a05d9a3af061b7f3e4aeba48360d6f1ebd7342bb4ab25168d637882224575d7bc9266fe3c8b70514421c204d1fe976dd43456c84d80db54aa59037c89aca0873c7376808471378b98527cbc14d00296960530a732e857100094e7b5c6014e3417779daa87d691ad23db54d98ee14a4eff8302993f1f8e965c7c8ed04c59a93779458793ff69b65223537388b1f40f3f03d81b2d6f3ce5eb1cc48d8d5bafaaea9e0d06401ca", 0xe1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="5800000000000000000000001720e8f302060000002bfd24f11e8ca0e8cd64eeb9960618747717b1dff7f11db8a3e982787d91962bf835f3027faaeb4c0d1b305e4b5e82cbaa0f0de166bb95a4814c5bd88e2822644d9d0f7a000000e9ba4016de63efc40030000000000000000f010000010004001a369b1243df0901971a5a58dd2f907408c17697b4babae6929e291c5401fa87601b7e0000000026e9a27f801d5ac8077765e5c63dd9ad85799d6d2b0945bb474427143c6d10fc87c818367f206733dc9475648e4526120696a77b5f27e5a76a44691b25d68a66ff1426322392c95eb6bd36b51935db73e3b0cad428f6f33e3ac00f887cb4014bb70607913f16d662ca67db6b2c8c506df89fcfd2830ff6d4e65c26928cc6620000000000"], 0x88}, 0xa044) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) [ 1916.473722][T16363] validate_nla: 2 callbacks suppressed [ 1916.473736][T16363] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 22:46:02 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r7, &(0x7f00000002c0)={&(0x7f0000000000)=@ethernet={0x1, @random="2926053134a9"}, 0x80, 0x0}, 0x0) [ 1916.545098][T16370] FAULT_INJECTION: forcing a failure. [ 1916.545098][T16370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1916.558532][T16363] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:46:02 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005640)={&(0x7f0000004400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000055c0)=[{&(0x7f0000004480)=""/4096, 0x1000}, {&(0x7f0000005480)=""/183, 0xb7}, {&(0x7f0000005540)=""/75, 0x4b}], 0x3, &(0x7f0000005600)=""/8, 0x8}, 0x0) recvmsg$kcm(r1, &(0x7f0000006800)={&(0x7f0000005680)=@hci, 0x80, &(0x7f0000006700)=[{&(0x7f0000005700)=""/4096, 0x1000}], 0x1, &(0x7f0000006740)=""/154, 0x9a}, 0x40000142) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x8) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00m%m\x00\"y '], 0xda00) [ 1916.653862][T16370] CPU: 1 PID: 16370 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1916.662573][T16370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1916.672620][T16370] Call Trace: [ 1916.675910][T16370] dump_stack+0x197/0x210 [ 1916.680243][T16370] should_fail.cold+0xa/0x15 [ 1916.684835][T16370] ? fault_create_debugfs_attr+0x180/0x180 [ 1916.690635][T16370] ? ___might_sleep+0x163/0x2c0 [ 1916.695495][T16370] should_fail_alloc_page+0x50/0x60 [ 1916.700684][T16370] __alloc_pages_nodemask+0x1a1/0x910 [ 1916.706049][T16370] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1916.711761][T16370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1916.717988][T16370] ? find_next_bit+0x107/0x130 [ 1916.722756][T16370] pcpu_populate_chunk+0xf8/0x940 [ 1916.727768][T16370] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1916.733474][T16370] ? find_next_bit+0x107/0x130 [ 1916.738234][T16370] pcpu_alloc+0xd5b/0x1380 [ 1916.742653][T16370] ? pcpu_alloc_area+0x820/0x820 [ 1916.747590][T16370] __alloc_percpu_gfp+0x28/0x30 [ 1916.752441][T16370] array_map_alloc+0x698/0x7d0 [ 1916.757197][T16370] ? array_of_map_free+0x50/0x50 [ 1916.762127][T16370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1916.768355][T16370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1916.774598][T16370] ? array_of_map_free+0x50/0x50 [ 1916.779526][T16370] __do_sys_bpf+0x478/0x3810 [ 1916.784107][T16370] ? bpf_prog_load+0x18f0/0x18f0 [ 1916.789041][T16370] ? __kasan_check_write+0x14/0x20 [ 1916.794140][T16370] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1916.799673][T16370] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1916.804945][T16370] ? wait_for_completion+0x440/0x440 [ 1916.810224][T16370] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1916.816468][T16370] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1916.821915][T16370] ? do_syscall_64+0x26/0x790 [ 1916.826585][T16370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1916.832641][T16370] ? do_syscall_64+0x26/0x790 [ 1916.837346][T16370] __x64_sys_bpf+0x73/0xb0 [ 1916.841751][T16370] do_syscall_64+0xfa/0x790 [ 1916.846282][T16370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1916.852176][T16370] RIP: 0033:0x45a919 [ 1916.856218][T16370] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1916.875822][T16370] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1916.884225][T16370] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1916.892182][T16370] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 22:46:03 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x4, 0x81, &(0x7f0000000080)) [ 1916.900140][T16370] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1916.908095][T16370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1916.916055][T16370] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:03 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) socket$kcm(0x10, 0x2, 0x0) 22:46:03 executing program 2 (fault-call:4 fault-nth:15): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:03 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') socketpair(0x10, 0x6, 0x81, &(0x7f0000000080)) [ 1917.136388][T16389] FAULT_INJECTION: forcing a failure. [ 1917.136388][T16389] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1917.162328][T16389] CPU: 0 PID: 16389 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1917.171026][T16389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1917.181097][T16389] Call Trace: [ 1917.184421][T16389] dump_stack+0x197/0x210 [ 1917.184448][T16389] should_fail.cold+0xa/0x15 [ 1917.184473][T16389] ? fault_create_debugfs_attr+0x180/0x180 [ 1917.184488][T16389] ? ___might_sleep+0x163/0x2c0 [ 1917.184513][T16389] should_fail_alloc_page+0x50/0x60 [ 1917.193435][T16389] __alloc_pages_nodemask+0x1a1/0x910 [ 1917.193458][T16389] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1917.193491][T16389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.193507][T16389] ? find_next_bit+0x107/0x130 [ 1917.193530][T16389] pcpu_populate_chunk+0xf8/0x940 [ 1917.193549][T16389] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1917.242297][T16389] ? find_next_bit+0x107/0x130 [ 1917.247088][T16389] pcpu_alloc+0xd5b/0x1380 [ 1917.251537][T16389] ? pcpu_alloc_area+0x820/0x820 [ 1917.256492][T16389] ? __this_cpu_preempt_check+0x35/0x190 [ 1917.262162][T16389] __alloc_percpu_gfp+0x28/0x30 [ 1917.267385][T16389] array_map_alloc+0x698/0x7d0 [ 1917.272207][T16389] ? array_of_map_free+0x50/0x50 [ 1917.277169][T16389] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.283427][T16389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.289689][T16389] ? array_of_map_free+0x50/0x50 [ 1917.294654][T16389] __do_sys_bpf+0x478/0x3810 [ 1917.299265][T16389] ? bpf_prog_load+0x18f0/0x18f0 [ 1917.304268][T16389] ? __kasan_check_write+0x14/0x20 [ 1917.309380][T16389] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1917.314965][T16389] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1917.320276][T16389] ? wait_for_completion+0x440/0x440 [ 1917.325587][T16389] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1917.331861][T16389] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1917.337355][T16389] ? do_syscall_64+0x26/0x790 [ 1917.342048][T16389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.348144][T16389] ? do_syscall_64+0x26/0x790 [ 1917.352960][T16389] __x64_sys_bpf+0x73/0xb0 [ 1917.357405][T16389] do_syscall_64+0xfa/0x790 [ 1917.361933][T16389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.367836][T16389] RIP: 0033:0x45a919 22:46:03 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) [ 1917.371745][T16389] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1917.391360][T16389] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1917.399784][T16389] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1917.407763][T16389] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1917.415747][T16389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1917.423724][T16389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1917.431700][T16389] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 1917.433784][T16398] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 22:46:03 executing program 2 (fault-call:4 fault-nth:16): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1917.483954][T16398] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:46:03 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) [ 1917.555953][T16406] FAULT_INJECTION: forcing a failure. [ 1917.555953][T16406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1917.580548][T16406] CPU: 0 PID: 16406 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1917.589438][T16406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1917.599498][T16406] Call Trace: [ 1917.603064][T16406] dump_stack+0x197/0x210 [ 1917.607428][T16406] should_fail.cold+0xa/0x15 [ 1917.612057][T16406] ? fault_create_debugfs_attr+0x180/0x180 [ 1917.617911][T16406] ? ___might_sleep+0x163/0x2c0 [ 1917.622783][T16406] should_fail_alloc_page+0x50/0x60 [ 1917.628004][T16406] __alloc_pages_nodemask+0x1a1/0x910 [ 1917.633405][T16406] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1917.639160][T16406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.645415][T16406] ? find_next_bit+0x107/0x130 [ 1917.650197][T16406] pcpu_populate_chunk+0xf8/0x940 [ 1917.656195][T16406] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1917.662366][T16406] ? find_next_bit+0x107/0x130 [ 1917.667172][T16406] pcpu_alloc+0xd5b/0x1380 [ 1917.671613][T16406] ? pcpu_alloc_area+0x820/0x820 [ 1917.676587][T16406] __alloc_percpu_gfp+0x28/0x30 [ 1917.681461][T16406] array_map_alloc+0x698/0x7d0 [ 1917.686251][T16406] ? array_of_map_free+0x50/0x50 [ 1917.691209][T16406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.697465][T16406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.703756][T16406] ? array_of_map_free+0x50/0x50 [ 1917.708717][T16406] __do_sys_bpf+0x478/0x3810 [ 1917.713337][T16406] ? bpf_prog_load+0x18f0/0x18f0 [ 1917.719252][T16406] ? __kasan_check_write+0x14/0x20 [ 1917.724386][T16406] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1917.729988][T16406] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1917.735301][T16406] ? wait_for_completion+0x440/0x440 [ 1917.741583][T16406] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1917.747872][T16406] ? trace_hardirqs_on_thunk+0x1a/0x1c 22:46:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, r1}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001680)={r0, 0x10, &(0x7f0000001640)={&(0x7f00000015c0)=""/66, 0x42, r1}}, 0x10) sendmsg$tipc(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x6, {0x0, 0x3, 0x3}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000100)="b08d8af97d95f14cecbf97c15075ea7997f57e3b1b1914ae56da18c26697dd9b426c19219d3cbe531542451c44a7023dced63b4809a45c7f43790a2e5be9e432d69865d79a7bab25653e00b96755e8a3f6e313cec1215239b6fd937400b80dd726fd9057bb", 0x65}, {&(0x7f0000000200)="fdee30726eb2745b81cc409ccb8d1fb1631d9b09e6bdd97ff073d4d7c788441a90e3d37ad198de84b91307a4f4a536f58a8ceb0f9a9785c0fc3a95b8d0c14f423ad755dc642a371ac189180edce751dab085948282948851ae61c333ff28dc82391002e4d31a014fa22fa9497903696030e188aff3e22e9b85af191a33e1f3a54a367614588de1ba700913e0", 0x8c}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="01497e5134a57a145ba0686773f70fd97339cc3c620521a49f2f5b64279aac3aef5794c35fc23ab62de41885a61fc2425c8178514358f7312adbfae94f475ab4421424a7c3409aaaaef99cdec9e2c2caf02e679a93ae0725141b96c52184b86df982d3731b9f0fce3e1a0257671e70083afcde648393bba90be508c354528af5e0f8aefef50ca9391cad42b61061872be571d08176457670c38ef517761462a5e570166742fd95f25c57ba10ef480e93f2640583f2c7a6a3b2134c8773bf902588ca8215466bfd8fca0c97a29a120cd340df90cbf110b4a734b5fc084d8669f6ee42cf34c06cf6154386eefb", 0xec}], 0x4, &(0x7f0000001440)="6a88b2d2a95acf8b921b2e1f60f41025b318cb3f170245dd85365fc8fcd55a2021d7f48b35e6c0e75961610543c029be7abe6314185d2d93bf77e4fbeb26058ba4b05d8ccbcc326b5b19b8584e373ee3202f7c214ad95d51d459a48cc9f0", 0x5e, 0x4002}, 0x4000000) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r2 = gettid() perf_event_open(&(0x7f0000001540)={0x3, 0x70, 0x22, 0xee, 0x3f, 0x3f, 0x0, 0x6, 0x84084, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000001500), 0x8}, 0x24040, 0x1ff, 0x7, 0x2, 0x9, 0x7fffffff, 0x5}, r2, 0xc, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8949, &(0x7f00000001c0)='bond0\x00') socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8949, &(0x7f00000001c0)='bond0\x00') write$cgroup_subtree(r3, &(0x7f0000001740)=ANY=[@ANYRESHEX, @ANYRESHEX=r4, @ANYRESDEC=0x0, @ANYRESOCT=r4, @ANYPTR64=&(0x7f00000017c0)=ANY=[@ANYRES16=r5], @ANYRESOCT=r6, @ANYPTR=&(0x7f0000001700)=ANY=[@ANYRESOCT=r7, @ANYRESHEX=r5]], 0x76) [ 1917.753378][T16406] ? do_syscall_64+0x26/0x790 [ 1917.758071][T16406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.764153][T16406] ? do_syscall_64+0x26/0x790 [ 1917.768861][T16406] __x64_sys_bpf+0x73/0xb0 [ 1917.773298][T16406] do_syscall_64+0xfa/0x790 [ 1917.777825][T16406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.783730][T16406] RIP: 0033:0x45a919 [ 1917.787635][T16406] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:46:04 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') 22:46:04 executing program 2 (fault-call:4 fault-nth:17): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1917.807247][T16406] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1917.807263][T16406] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1917.807271][T16406] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1917.807279][T16406] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1917.807288][T16406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1917.807296][T16406] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 1917.901600][T16413] FAULT_INJECTION: forcing a failure. [ 1917.901600][T16413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1917.922701][T16413] CPU: 0 PID: 16413 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1917.931413][T16413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1917.941480][T16413] Call Trace: [ 1917.944789][T16413] dump_stack+0x197/0x210 [ 1917.949145][T16413] should_fail.cold+0xa/0x15 [ 1917.953748][T16413] ? fault_create_debugfs_attr+0x180/0x180 [ 1917.959565][T16413] ? ___might_sleep+0x163/0x2c0 [ 1917.964438][T16413] should_fail_alloc_page+0x50/0x60 [ 1917.969656][T16413] __alloc_pages_nodemask+0x1a1/0x910 [ 1917.975052][T16413] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1917.980791][T16413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.987044][T16413] ? find_next_bit+0x107/0x130 [ 1917.991811][T16413] pcpu_populate_chunk+0xf8/0x940 [ 1917.996830][T16413] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1918.002544][T16413] ? find_next_bit+0x107/0x130 [ 1918.007314][T16413] pcpu_alloc+0xd5b/0x1380 [ 1918.011726][T16413] ? pcpu_alloc_area+0x820/0x820 [ 1918.016660][T16413] __alloc_percpu_gfp+0x28/0x30 [ 1918.021519][T16413] array_map_alloc+0x698/0x7d0 [ 1918.026284][T16413] ? array_of_map_free+0x50/0x50 [ 1918.031218][T16413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1918.037713][T16413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.043942][T16413] ? array_of_map_free+0x50/0x50 [ 1918.048870][T16413] __do_sys_bpf+0x478/0x3810 [ 1918.054431][T16413] ? bpf_prog_load+0x18f0/0x18f0 [ 1918.059369][T16413] ? __kasan_check_write+0x14/0x20 [ 1918.064561][T16413] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1918.070096][T16413] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1918.075370][T16413] ? wait_for_completion+0x440/0x440 [ 1918.080650][T16413] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1918.086886][T16413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1918.092331][T16413] ? do_syscall_64+0x26/0x790 [ 1918.096998][T16413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.103059][T16413] ? do_syscall_64+0x26/0x790 [ 1918.107731][T16413] __x64_sys_bpf+0x73/0xb0 [ 1918.112149][T16413] do_syscall_64+0xfa/0x790 [ 1918.116640][T16413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.122518][T16413] RIP: 0033:0x45a919 [ 1918.126399][T16413] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:46:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a1, &(0x7f0000000680)='&@[\x00') [ 1918.145987][T16413] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1918.154387][T16413] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1918.162343][T16413] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1918.170301][T16413] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1918.178256][T16413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1918.186218][T16413] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:04 executing program 2 (fault-call:4 fault-nth:18): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) socket$kcm(0x10, 0x2, 0x0) [ 1918.478004][T16433] FAULT_INJECTION: forcing a failure. [ 1918.478004][T16433] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.494618][T16433] CPU: 1 PID: 16433 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1918.501196][T16432] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1918.503325][T16433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1918.503334][T16433] Call Trace: [ 1918.503361][T16433] dump_stack+0x197/0x210 [ 1918.503393][T16433] should_fail.cold+0xa/0x15 [ 1918.503421][T16433] ? fault_create_debugfs_attr+0x180/0x180 [ 1918.503443][T16433] ? ___might_sleep+0x163/0x2c0 [ 1918.503467][T16433] __should_failslab+0x121/0x190 [ 1918.521471][T16432] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1918.521686][T16433] should_failslab+0x9/0x14 [ 1918.561987][T16433] __kmalloc+0x2e0/0x770 [ 1918.566248][T16433] ? mark_held_locks+0xa4/0xf0 [ 1918.571041][T16433] ? pcpu_mem_zalloc+0xac/0xf0 22:46:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x0) [ 1918.575825][T16433] pcpu_mem_zalloc+0xac/0xf0 [ 1918.580450][T16433] pcpu_create_chunk+0x28/0x7f0 [ 1918.585325][T16433] pcpu_alloc+0x10f3/0x1380 [ 1918.589865][T16433] ? pcpu_alloc_area+0x820/0x820 [ 1918.594838][T16433] __alloc_percpu_gfp+0x28/0x30 [ 1918.599721][T16433] array_map_alloc+0x698/0x7d0 [ 1918.604807][T16433] ? array_of_map_free+0x50/0x50 [ 1918.609772][T16433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1918.616121][T16433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.622370][T16433] ? array_of_map_free+0x50/0x50 [ 1918.627317][T16433] __do_sys_bpf+0x478/0x3810 [ 1918.631913][T16433] ? bpf_prog_load+0x18f0/0x18f0 [ 1918.636850][T16433] ? __kasan_check_write+0x14/0x20 [ 1918.641948][T16433] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1918.647492][T16433] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1918.652797][T16433] ? wait_for_completion+0x440/0x440 [ 1918.658099][T16433] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1918.664365][T16433] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1918.669839][T16433] ? do_syscall_64+0x26/0x790 [ 1918.674528][T16433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.680579][T16433] ? do_syscall_64+0x26/0x790 [ 1918.685276][T16433] __x64_sys_bpf+0x73/0xb0 [ 1918.689702][T16433] do_syscall_64+0xfa/0x790 [ 1918.694211][T16433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.700099][T16433] RIP: 0033:0x45a919 [ 1918.704050][T16433] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1918.723667][T16433] RSP: 002b:00007ffb4df7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1918.732091][T16433] RAX: ffffffffffffffda RBX: 00007ffb4df7bc90 RCX: 000000000045a919 [ 1918.740078][T16433] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1918.748064][T16433] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1918.756031][T16433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df7c6d4 [ 1918.764005][T16433] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:05 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) socket$kcm(0x29, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x70, 0x7b, 0x0, 0xb4, 0x40, 0x0, 0x401, 0x80000, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x100000001, 0x8}, 0x420, 0x200, 0x2, 0x3, 0x40, 0x9314, 0x40}, r2, 0x3, r3, 0x0) 22:46:05 executing program 2 (fault-call:4 fault-nth:19): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1918.846682][T16437] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1918.874478][T16437] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 22:46:05 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:46:05 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r4) socket$kcm(0x10, 0x2, 0x0) [ 1919.002294][T16446] FAULT_INJECTION: forcing a failure. [ 1919.002294][T16446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1919.042571][T16446] CPU: 1 PID: 16446 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1919.051287][T16446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.061340][T16446] Call Trace: [ 1919.064645][T16446] dump_stack+0x197/0x210 [ 1919.064669][T16446] should_fail.cold+0xa/0x15 [ 1919.064691][T16446] ? fault_create_debugfs_attr+0x180/0x180 [ 1919.073587][T16446] ? ___might_sleep+0x163/0x2c0 [ 1919.073615][T16446] should_fail_alloc_page+0x50/0x60 [ 1919.073635][T16446] __alloc_pages_nodemask+0x1a1/0x910 [ 1919.094952][T16446] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1919.100522][T16446] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1919.106279][T16446] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1919.112549][T16446] alloc_pages_current+0x107/0x210 [ 1919.117662][T16446] ? ___might_sleep+0x163/0x2c0 [ 1919.122761][T16446] __vmalloc_node_range+0x4f8/0x810 [ 1919.127951][T16446] __vmalloc+0x44/0x50 [ 1919.132009][T16446] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1919.136759][T16446] pcpu_mem_zalloc+0x8a/0xf0 [ 1919.141386][T16446] pcpu_create_chunk+0x12d/0x7f0 [ 1919.146309][T16446] pcpu_alloc+0x10f3/0x1380 [ 1919.150799][T16446] ? pcpu_alloc_area+0x820/0x820 [ 1919.155728][T16446] __alloc_percpu_gfp+0x28/0x30 [ 1919.160605][T16446] array_map_alloc+0x698/0x7d0 [ 1919.165377][T16446] ? array_of_map_free+0x50/0x50 [ 1919.170357][T16446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.176594][T16446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.182834][T16446] ? array_of_map_free+0x50/0x50 [ 1919.187954][T16446] __do_sys_bpf+0x478/0x3810 [ 1919.192531][T16446] ? bpf_prog_load+0x18f0/0x18f0 [ 1919.197454][T16446] ? __kasan_check_write+0x14/0x20 [ 1919.202548][T16446] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1919.208077][T16446] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1919.213350][T16446] ? wait_for_completion+0x440/0x440 [ 1919.218645][T16446] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1919.224879][T16446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1919.230334][T16446] ? do_syscall_64+0x26/0x790 [ 1919.235006][T16446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.241072][T16446] ? do_syscall_64+0x26/0x790 [ 1919.245737][T16446] __x64_sys_bpf+0x73/0xb0 [ 1919.250136][T16446] do_syscall_64+0xfa/0x790 [ 1919.254652][T16446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.260522][T16446] RIP: 0033:0x45a919 [ 1919.264410][T16446] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.284009][T16446] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1919.292418][T16446] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1919.300373][T16446] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1919.308336][T16446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1919.316291][T16446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1919.324247][T16446] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:05 executing program 2 (fault-call:4 fault-nth:20): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:05 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') [ 1919.416812][T16454] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1919.433177][T16454] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1919.479990][T16457] FAULT_INJECTION: forcing a failure. [ 1919.479990][T16457] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1919.493674][T16457] CPU: 1 PID: 16457 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1919.502366][T16457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.512432][T16457] Call Trace: [ 1919.515725][T16457] dump_stack+0x197/0x210 [ 1919.520048][T16457] should_fail.cold+0xa/0x15 [ 1919.524630][T16457] ? fault_create_debugfs_attr+0x180/0x180 [ 1919.530443][T16457] ? ___might_sleep+0x163/0x2c0 [ 1919.535319][T16457] should_fail_alloc_page+0x50/0x60 [ 1919.540503][T16457] __alloc_pages_nodemask+0x1a1/0x910 [ 1919.545860][T16457] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1919.551403][T16457] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1919.557123][T16457] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1919.563396][T16457] alloc_pages_current+0x107/0x210 [ 1919.568494][T16457] ? ___might_sleep+0x163/0x2c0 [ 1919.573336][T16457] __vmalloc_node_range+0x4f8/0x810 [ 1919.578563][T16457] __vmalloc+0x44/0x50 [ 1919.582702][T16457] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1919.587464][T16457] pcpu_mem_zalloc+0x8a/0xf0 [ 1919.592053][T16457] pcpu_create_chunk+0x12d/0x7f0 [ 1919.596977][T16457] pcpu_alloc+0x10f3/0x1380 [ 1919.601481][T16457] ? pcpu_alloc_area+0x820/0x820 [ 1919.606411][T16457] __alloc_percpu_gfp+0x28/0x30 [ 1919.611261][T16457] array_map_alloc+0x698/0x7d0 [ 1919.616016][T16457] ? array_of_map_free+0x50/0x50 [ 1919.620944][T16457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.627520][T16457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.633775][T16457] ? array_of_map_free+0x50/0x50 [ 1919.638702][T16457] __do_sys_bpf+0x478/0x3810 [ 1919.643282][T16457] ? bpf_prog_load+0x18f0/0x18f0 [ 1919.648220][T16457] ? __kasan_check_write+0x14/0x20 [ 1919.653330][T16457] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1919.658864][T16457] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1919.664223][T16457] ? wait_for_completion+0x440/0x440 [ 1919.669520][T16457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1919.675781][T16457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1919.681341][T16457] ? do_syscall_64+0x26/0x790 [ 1919.686009][T16457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.692127][T16457] ? do_syscall_64+0x26/0x790 [ 1919.696858][T16457] __x64_sys_bpf+0x73/0xb0 [ 1919.701270][T16457] do_syscall_64+0xfa/0x790 [ 1919.705784][T16457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.711679][T16457] RIP: 0033:0x45a919 [ 1919.715576][T16457] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.735202][T16457] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1919.743616][T16457] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1919.751603][T16457] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1919.759574][T16457] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1919.767565][T16457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1919.775555][T16457] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') 22:46:06 executing program 2 (fault-call:4 fault-nth:21): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:06 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:46:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:06 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/\xe3et/tun\x00', 0x4a400, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r3, 0xab) sendmsg(r2, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) 22:46:06 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) [ 1920.046661][T16475] FAULT_INJECTION: forcing a failure. [ 1920.046661][T16475] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1920.085521][T16475] CPU: 0 PID: 16475 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1920.094237][T16475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.104287][T16475] Call Trace: [ 1920.104312][T16475] dump_stack+0x197/0x210 [ 1920.104338][T16475] should_fail.cold+0xa/0x15 [ 1920.104361][T16475] ? fault_create_debugfs_attr+0x180/0x180 [ 1920.104377][T16475] ? ___might_sleep+0x163/0x2c0 [ 1920.104406][T16475] should_fail_alloc_page+0x50/0x60 [ 1920.104421][T16475] __alloc_pages_nodemask+0x1a1/0x910 [ 1920.104437][T16475] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1920.104456][T16475] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1920.104491][T16475] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1920.155370][T16475] alloc_pages_current+0x107/0x210 [ 1920.160490][T16475] ? ___might_sleep+0x163/0x2c0 [ 1920.165349][T16475] __vmalloc_node_range+0x4f8/0x810 [ 1920.171551][T16475] __vmalloc+0x44/0x50 [ 1920.177917][T16475] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1920.182701][T16475] pcpu_mem_zalloc+0x8a/0xf0 [ 1920.187304][T16475] pcpu_create_chunk+0x12d/0x7f0 [ 1920.192251][T16475] pcpu_alloc+0x10f3/0x1380 [ 1920.196802][T16475] ? pcpu_alloc_area+0x820/0x820 [ 1920.201766][T16475] __alloc_percpu_gfp+0x28/0x30 [ 1920.206635][T16475] array_map_alloc+0x698/0x7d0 [ 1920.211411][T16475] ? array_of_map_free+0x50/0x50 [ 1920.216367][T16475] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.222624][T16475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.228877][T16475] ? array_of_map_free+0x50/0x50 [ 1920.233839][T16475] __do_sys_bpf+0x478/0x3810 [ 1920.238458][T16475] ? bpf_prog_load+0x18f0/0x18f0 [ 1920.243417][T16475] ? __kasan_check_write+0x14/0x20 [ 1920.248546][T16475] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1920.254106][T16475] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1920.259409][T16475] ? wait_for_completion+0x440/0x440 [ 1920.264722][T16475] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1920.271013][T16475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1920.276488][T16475] ? do_syscall_64+0x26/0x790 [ 1920.281180][T16475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.287263][T16475] ? do_syscall_64+0x26/0x790 [ 1920.291967][T16475] __x64_sys_bpf+0x73/0xb0 [ 1920.296407][T16475] do_syscall_64+0xfa/0x790 [ 1920.300935][T16475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.306835][T16475] RIP: 0033:0x45a919 [ 1920.310742][T16475] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.330349][T16475] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1920.338931][T16475] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1920.346998][T16475] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1920.354983][T16475] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1920.362955][T16475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1920.370927][T16475] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:06 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8949, &(0x7f00000001c0)='bond0\x00') r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', 0x0, 0x1c}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000001c0)={r4, r5}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0x5) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r7) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r8) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r9, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r11) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r12, 0x0) r13 = openat$cgroup_type(r12, &(0x7f0000000740)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r13, &(0x7f0000000080)='threaded\x00', 0x9) close(r11) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r6, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r15) write$cgroup_type(r15, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r15) bpf$PROG_LOAD(0x5, &(0x7f0000004800)={0x0, 0xa, &(0x7f0000000280)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r7}, @jmp={0x5, 0x1, 0x6, 0xa, 0xe, 0xc, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x9, 0xd, 0x9, 0xfffffffffffffff4, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x0, 0x8, 0x5, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @ldst={0x0, 0x0, 0x1, 0x3, 0x8, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map={0x18, 0x8, 0x1, 0x0, r8}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000400)=""/131, 0x1f00, 0x2, [], r10, 0xca451d872c257773, r11, 0x8, &(0x7f00000046c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004700)={0x0, 0x10, 0x6, 0xe}, 0x10, r14, r15}, 0x78) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r16, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r16, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x100000001, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0xa, 0x5}, 0x0, 0x0, &(0x7f0000000500)={0x1, 0xa, 0x100}, &(0x7f0000000540)=0x8001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x100000000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0x1, &(0x7f0000000300)=@raw=[@generic={0xcb, 0x9, 0x6, 0x8, 0x20}], &(0x7f0000000340)='GPL\x00', 0x16f, 0x0, 0x0, 0x41100, 0x8, [], r10, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0x3, 0x9, 0x6}, 0x10, r17}, 0x78) r18 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r18, 0xab) sendmsg(r3, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r19 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r19, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 22:46:06 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a0, &(0x7f0000000000)='&@[\x00') 22:46:06 executing program 2 (fault-call:4 fault-nth:22): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:06 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) socket$kcm(0x10, 0x2, 0x0) 22:46:06 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='/c^GPL\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000100)='em1\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) r2 = openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="006d3b6d00027920a3dd2c11cedc87b6964e3cc9312a51dac30397b9167810893a10f929b1d0f5c6bad9339df6dc3142d1bfa9f3fa1c090083078f8fee9e4492a2667d598bdd60870abbf3d942fe691cc33f4323c55c8476199929c726180042573008d0fa820350c5e09ce5607bdea81a3e6664b860dd3456c4a7666a710ce57587eba06ce95a82c8816b0f0a079da99dcd0af984393d730b045794b5f8fd6c57fe776639e68e0ffd948a8ad1f2bcf2eb5c61f35ed7ececc06591458e08976c0d09ac83f4c6834bfb01a9878783cdc97a6369a4093c8037b53f0b4730f47981daed533e7e068bc63256c77400cf2d878f4b5c1b5f4396eb"], 0xda00) [ 1920.612790][T16501] FAULT_INJECTION: forcing a failure. [ 1920.612790][T16501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1920.651298][T16501] CPU: 0 PID: 16501 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1920.660045][T16501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.670104][T16501] Call Trace: [ 1920.673402][T16501] dump_stack+0x197/0x210 [ 1920.677732][T16501] should_fail.cold+0xa/0x15 [ 1920.682335][T16501] ? fault_create_debugfs_attr+0x180/0x180 [ 1920.688325][T16501] ? ___might_sleep+0x163/0x2c0 [ 1920.693170][T16501] should_fail_alloc_page+0x50/0x60 [ 1920.698355][T16501] __alloc_pages_nodemask+0x1a1/0x910 [ 1920.703714][T16501] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1920.709418][T16501] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1920.715151][T16501] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1920.721401][T16501] alloc_pages_current+0x107/0x210 [ 1920.726503][T16501] ? ___might_sleep+0x163/0x2c0 [ 1920.731344][T16501] __vmalloc_node_range+0x4f8/0x810 [ 1920.736591][T16501] __vmalloc+0x44/0x50 [ 1920.740669][T16501] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1920.745441][T16501] pcpu_mem_zalloc+0x8a/0xf0 [ 1920.750058][T16501] pcpu_create_chunk+0x12d/0x7f0 [ 1920.755007][T16501] pcpu_alloc+0x10f3/0x1380 [ 1920.759503][T16501] ? pcpu_alloc_area+0x820/0x820 [ 1920.764454][T16501] __alloc_percpu_gfp+0x28/0x30 [ 1920.769306][T16501] array_map_alloc+0x698/0x7d0 [ 1920.774083][T16501] ? array_of_map_free+0x50/0x50 [ 1920.780696][T16501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.786940][T16501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.793177][T16501] ? array_of_map_free+0x50/0x50 [ 1920.798110][T16501] __do_sys_bpf+0x478/0x3810 [ 1920.802712][T16501] ? bpf_prog_load+0x18f0/0x18f0 [ 1920.807654][T16501] ? __kasan_check_write+0x14/0x20 [ 1920.812774][T16501] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1920.818369][T16501] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1920.823654][T16501] ? wait_for_completion+0x440/0x440 [ 1920.828948][T16501] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1920.835196][T16501] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1920.840647][T16501] ? do_syscall_64+0x26/0x790 [ 1920.845375][T16501] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.851644][T16501] ? do_syscall_64+0x26/0x790 [ 1920.856496][T16501] __x64_sys_bpf+0x73/0xb0 [ 1920.860929][T16501] do_syscall_64+0xfa/0x790 [ 1920.865455][T16501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.871335][T16501] RIP: 0033:0x45a919 [ 1920.875234][T16501] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.895013][T16501] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1920.903435][T16501] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 22:46:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) 22:46:07 executing program 2 (fault-call:4 fault-nth:23): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1920.911409][T16501] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1920.919374][T16501] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1920.927344][T16501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1920.935331][T16501] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) socket$kcm(0x2c, 0x3, 0x0) [ 1921.069053][T16518] FAULT_INJECTION: forcing a failure. [ 1921.069053][T16518] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1921.101981][T16518] CPU: 0 PID: 16518 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1921.110686][T16518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.120767][T16518] Call Trace: [ 1921.124087][T16518] dump_stack+0x197/0x210 [ 1921.128456][T16518] should_fail.cold+0xa/0x15 [ 1921.133056][T16518] ? fault_create_debugfs_attr+0x180/0x180 [ 1921.138857][T16518] ? ___might_sleep+0x163/0x2c0 [ 1921.143726][T16518] should_fail_alloc_page+0x50/0x60 [ 1921.148923][T16518] __alloc_pages_nodemask+0x1a1/0x910 [ 1921.154299][T16518] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1921.159831][T16518] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1921.165543][T16518] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1921.171774][T16518] alloc_pages_current+0x107/0x210 [ 1921.176875][T16518] ? ___might_sleep+0x163/0x2c0 [ 1921.181712][T16518] __vmalloc_node_range+0x4f8/0x810 [ 1921.186904][T16518] __vmalloc+0x44/0x50 [ 1921.190966][T16518] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1921.195733][T16518] pcpu_mem_zalloc+0x8a/0xf0 [ 1921.200333][T16518] pcpu_create_chunk+0x12d/0x7f0 [ 1921.205271][T16518] pcpu_alloc+0x10f3/0x1380 [ 1921.209763][T16518] ? pcpu_alloc_area+0x820/0x820 [ 1921.214732][T16518] __alloc_percpu_gfp+0x28/0x30 [ 1921.219589][T16518] array_map_alloc+0x698/0x7d0 [ 1921.224362][T16518] ? array_of_map_free+0x50/0x50 [ 1921.229311][T16518] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.235544][T16518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.241768][T16518] ? array_of_map_free+0x50/0x50 [ 1921.246698][T16518] __do_sys_bpf+0x478/0x3810 [ 1921.251275][T16518] ? bpf_prog_load+0x18f0/0x18f0 [ 1921.256197][T16518] ? __kasan_check_write+0x14/0x20 [ 1921.261315][T16518] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1921.266861][T16518] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1921.272138][T16518] ? wait_for_completion+0x440/0x440 [ 1921.277426][T16518] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1921.283661][T16518] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1921.289130][T16518] ? do_syscall_64+0x26/0x790 [ 1921.293797][T16518] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.299858][T16518] ? do_syscall_64+0x26/0x790 [ 1921.304557][T16518] __x64_sys_bpf+0x73/0xb0 [ 1921.308994][T16518] do_syscall_64+0xfa/0x790 [ 1921.313521][T16518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.319421][T16518] RIP: 0033:0x45a919 [ 1921.323328][T16518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.342954][T16518] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1921.351378][T16518] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1921.359372][T16518] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 22:46:07 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0, 0xffffffffffffffd1, 0x0, 0x27d}, 0x20000000) [ 1921.367969][T16518] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1921.375951][T16518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1921.375960][T16518] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:07 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) 22:46:07 executing program 2 (fault-call:4 fault-nth:24): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:07 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:07 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) 22:46:07 executing program 0: r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='GPLsystemwlan1wlan0.self!keyring#em0keyring\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:46:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) socket$kcm(0x10, 0x2, 0x0) [ 1921.706319][T16541] FAULT_INJECTION: forcing a failure. [ 1921.706319][T16541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1921.740933][T16541] CPU: 1 PID: 16541 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1921.749858][T16541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.759930][T16541] Call Trace: [ 1921.763250][T16541] dump_stack+0x197/0x210 [ 1921.767619][T16541] should_fail.cold+0xa/0x15 [ 1921.772329][T16541] ? fault_create_debugfs_attr+0x180/0x180 [ 1921.778162][T16541] ? ___might_sleep+0x163/0x2c0 [ 1921.783053][T16541] should_fail_alloc_page+0x50/0x60 [ 1921.788277][T16541] __alloc_pages_nodemask+0x1a1/0x910 [ 1921.793704][T16541] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1921.799278][T16541] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1921.805032][T16541] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1921.811306][T16541] alloc_pages_current+0x107/0x210 [ 1921.816476][T16541] ? ___might_sleep+0x163/0x2c0 [ 1921.821352][T16541] __vmalloc_node_range+0x4f8/0x810 [ 1921.826683][T16541] __vmalloc+0x44/0x50 [ 1921.830767][T16541] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1921.835538][T16541] pcpu_mem_zalloc+0x8a/0xf0 [ 1921.840121][T16541] pcpu_create_chunk+0x12d/0x7f0 [ 1921.845066][T16541] pcpu_alloc+0x10f3/0x1380 [ 1921.849601][T16541] ? pcpu_alloc_area+0x820/0x820 [ 1921.854537][T16541] __alloc_percpu_gfp+0x28/0x30 [ 1921.859391][T16541] array_map_alloc+0x698/0x7d0 [ 1921.864171][T16541] ? array_of_map_free+0x50/0x50 [ 1921.869135][T16541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.875379][T16541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.881644][T16541] ? array_of_map_free+0x50/0x50 [ 1921.886605][T16541] __do_sys_bpf+0x478/0x3810 [ 1921.889344][T16557] validate_nla: 4 callbacks suppressed [ 1921.889354][T16557] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1921.891202][T16541] ? bpf_prog_load+0x18f0/0x18f0 [ 1921.891218][T16541] ? __kasan_check_write+0x14/0x20 [ 1921.891241][T16541] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1921.899414][T16557] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1921.904843][T16541] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1921.904864][T16541] ? wait_for_completion+0x440/0x440 [ 1921.904892][T16541] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1921.904925][T16541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1921.904942][T16541] ? do_syscall_64+0x26/0x790 [ 1921.904957][T16541] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.904971][T16541] ? do_syscall_64+0x26/0x790 [ 1921.904992][T16541] __x64_sys_bpf+0x73/0xb0 [ 1921.905010][T16541] do_syscall_64+0xfa/0x790 [ 1921.905027][T16541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.905046][T16541] RIP: 0033:0x45a919 [ 1921.987295][T16541] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.006900][T16541] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1922.015408][T16541] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1922.023390][T16541] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1922.031408][T16541] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1922.039368][T16541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1922.047373][T16541] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:08 executing program 2 (fault-call:4 fault-nth:25): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) socket$kcm(0x10, 0x2, 0x0) 22:46:08 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) close(r6) [ 1922.160901][T16561] FAULT_INJECTION: forcing a failure. [ 1922.160901][T16561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1922.175930][T16561] CPU: 1 PID: 16561 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1922.184646][T16561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.184653][T16561] Call Trace: [ 1922.184678][T16561] dump_stack+0x197/0x210 [ 1922.184705][T16561] should_fail.cold+0xa/0x15 [ 1922.184728][T16561] ? fault_create_debugfs_attr+0x180/0x180 [ 1922.184745][T16561] ? ___might_sleep+0x163/0x2c0 [ 1922.184782][T16561] should_fail_alloc_page+0x50/0x60 [ 1922.184798][T16561] __alloc_pages_nodemask+0x1a1/0x910 [ 1922.184816][T16561] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1922.184835][T16561] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1922.184865][T16561] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1922.245970][T16561] alloc_pages_current+0x107/0x210 [ 1922.251069][T16561] ? ___might_sleep+0x163/0x2c0 [ 1922.256264][T16561] __vmalloc_node_range+0x4f8/0x810 [ 1922.261546][T16561] __vmalloc+0x44/0x50 [ 1922.265606][T16561] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1922.270358][T16561] pcpu_mem_zalloc+0x8a/0xf0 [ 1922.274935][T16561] pcpu_create_chunk+0x12d/0x7f0 [ 1922.279872][T16561] pcpu_alloc+0x10f3/0x1380 [ 1922.284381][T16561] ? pcpu_alloc_area+0x820/0x820 [ 1922.289420][T16561] __alloc_percpu_gfp+0x28/0x30 [ 1922.294259][T16561] array_map_alloc+0x698/0x7d0 [ 1922.299015][T16561] ? array_of_map_free+0x50/0x50 [ 1922.303953][T16561] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.310179][T16561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.316408][T16561] ? array_of_map_free+0x50/0x50 [ 1922.321346][T16561] __do_sys_bpf+0x478/0x3810 [ 1922.325928][T16561] ? bpf_prog_load+0x18f0/0x18f0 [ 1922.330850][T16561] ? __kasan_check_write+0x14/0x20 [ 1922.335950][T16561] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1922.341492][T16561] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1922.346777][T16561] ? wait_for_completion+0x440/0x440 [ 1922.352065][T16561] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1922.358303][T16561] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1922.363752][T16561] ? do_syscall_64+0x26/0x790 [ 1922.368427][T16561] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.374488][T16561] ? do_syscall_64+0x26/0x790 [ 1922.379157][T16561] __x64_sys_bpf+0x73/0xb0 [ 1922.383559][T16561] do_syscall_64+0xfa/0x790 [ 1922.388055][T16561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.393941][T16561] RIP: 0033:0x45a919 [ 1922.397824][T16561] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.417422][T16561] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1922.425820][T16561] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1922.433774][T16561] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1922.441731][T16561] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1922.449700][T16561] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1922.457657][T16561] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:08 executing program 2 (fault-call:4 fault-nth:26): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:08 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x100, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@l2={0x1f, 0x0, {0x1, 0x80, 0xff, 0x9, 0x5, 0x8}, 0x2, 0x80}, 0x80, 0x0, 0xfffffffffffffd85}, 0x20000004) socket$kcm(0x29, 0x5, 0x0) 22:46:08 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1922.564317][T16573] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1922.587879][T16573] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1922.727762][T16582] FAULT_INJECTION: forcing a failure. [ 1922.727762][T16582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1922.775197][T16582] CPU: 0 PID: 16582 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1922.783930][T16582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.794012][T16582] Call Trace: [ 1922.797338][T16582] dump_stack+0x197/0x210 [ 1922.801725][T16582] should_fail.cold+0xa/0x15 [ 1922.806361][T16582] ? fault_create_debugfs_attr+0x180/0x180 [ 1922.812188][T16582] ? ___might_sleep+0x163/0x2c0 [ 1922.817089][T16582] should_fail_alloc_page+0x50/0x60 22:46:09 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r2) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0xfffffffffffffee8, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x8040) recvmsg$kcm(r3, &(0x7f0000004680)={&(0x7f0000004140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004600)=[{&(0x7f00000041c0)=""/251, 0xfb}, {&(0x7f00000042c0)=""/134, 0x86}, {&(0x7f0000004380)=""/107, 0x6b}, {&(0x7f0000004400)=""/93, 0x5d}, {&(0x7f0000004480)=""/163, 0xa3}, {&(0x7f0000004540)=""/182, 0xb6}], 0x6}, 0x40000101) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r5) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000047c0)={r0, 0x10, &(0x7f0000004780)={&(0x7f0000004740)=""/58, 0x3a, 0xffffffffffffffff}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r7) write$cgroup_type(r7, &(0x7f0000000080)='threaded\x00', 0xfffffc61) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000040)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000400)=""/131, 0x1f00, 0x2, [], r4, 0xca451d872c257773, r5, 0x8, &(0x7f00000046c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000004700)={0x0, 0x20000010, 0x6, 0xe}, 0x10, r6, r7}, 0x78) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)=r4) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r8 = socket$kcm(0x2, 0x200000000000001, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f0000000040)=r9, 0xab) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) [ 1922.822335][T16582] __alloc_pages_nodemask+0x1a1/0x910 [ 1922.827738][T16582] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1922.833314][T16582] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1922.839088][T16582] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1922.846499][T16582] alloc_pages_current+0x107/0x210 [ 1922.851627][T16582] ? ___might_sleep+0x163/0x2c0 [ 1922.856605][T16582] __vmalloc_node_range+0x4f8/0x810 [ 1922.861904][T16582] __vmalloc+0x44/0x50 [ 1922.866008][T16582] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1922.870798][T16582] pcpu_mem_zalloc+0x8a/0xf0 [ 1922.875429][T16582] pcpu_create_chunk+0x12d/0x7f0 [ 1922.880530][T16582] pcpu_alloc+0x10f3/0x1380 [ 1922.885071][T16582] ? pcpu_alloc_area+0x820/0x820 [ 1922.890066][T16582] __alloc_percpu_gfp+0x28/0x30 [ 1922.894967][T16582] array_map_alloc+0x698/0x7d0 [ 1922.899774][T16582] ? array_of_map_free+0x50/0x50 [ 1922.904750][T16582] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.911029][T16582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.917310][T16582] ? array_of_map_free+0x50/0x50 [ 1922.922311][T16582] __do_sys_bpf+0x478/0x3810 [ 1922.926950][T16582] ? bpf_prog_load+0x18f0/0x18f0 [ 1922.931970][T16582] ? __kasan_check_write+0x14/0x20 [ 1922.937102][T16582] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1922.943632][T16582] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1922.948953][T16582] ? wait_for_completion+0x440/0x440 [ 1922.948986][T16582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1922.949029][T16582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1922.949046][T16582] ? do_syscall_64+0x26/0x790 [ 1922.949063][T16582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.949081][T16582] ? do_syscall_64+0x26/0x790 [ 1922.949115][T16582] __x64_sys_bpf+0x73/0xb0 [ 1922.949138][T16582] do_syscall_64+0xfa/0x790 [ 1922.949163][T16582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.996629][T16582] RIP: 0033:0x45a919 [ 1923.000554][T16582] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:46:09 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x1, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000000d00)={&(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10, 0x0}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYPTR64], 0x8) 22:46:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) 22:46:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) [ 1923.020186][T16582] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1923.028641][T16582] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1923.036658][T16582] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1923.044658][T16582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1923.052663][T16582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1923.060662][T16582] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:09 executing program 2 (fault-call:4 fault-nth:27): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:09 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001ac0)='./cg]oup\'.`\x8e/syz1\x00\x87#\x85\xc4\xb1\xa7;\xd1<\x97\x9d\x93\x9cA\xa6\xa2g\x95\xe7\xa1]\xc2[1\x10\xe4F\xb12\xfd\xcd\x81f\xb77U\xb9\xaa\xb0y\xecx\xb9\xf2\xc8\x0e!\xd6\x1a\x9c\xdbN\xd1\x9a\xacE\x19s\x8f\xef/\xb6\xe6\xe9\xca\xdc.{b\xd1 \xbf\xc2\x8e\x83\xb6j\x12\xd6\xf8\x98o\xe2M\xf7\xdf\x10\xf9x\xadb\xb1\xa0\xf6D7\xea\x18p\xc0m\xe6s\x87\xe0y\x8f=\xe6\xe8\xc1\xb3fjeV_\x89\xb2\xb8$\xf6\xf4\xa2\x12\xe0=/\x06\x84\x04\xb7\x83lm\x19\x85\xe5\xa1WR\x1b\x11\x88\xd4&f\xfc\xb2W\xc4\xa8\xb315\x8d\x83\xc0MP\xd4\xec(!\xa8\x9b\xbc\xba\x1b\xbf\xffw\xa2k\x7fi\xdb\x12\xa38\xc9\x1eE\xc5\xedf\xafp\by\x16\x1d\x02\x18\xa2\xb348\xaa\xeb4\xdc\xd0\x0e\xdc+\xcb\x17\xb5:\x96\xc6\xb5\xfa\vNK\xb0O\xf4v$\x0e\x19\xeapc`\x106\xb4\x93\xd5\x0f\x94j\x06\xbd\'&(\x9eU7`<\xc22\xec9:\x8c\xb3\xacw\x1a\xe6G\x1f\x944\xd0\x0e.\xaa\xcd\x03\xe7\x0e\xec4\xa6\xa8\xfc\x17\xbakw\xf8\x8a\xd2*\x0f^\xfc*G\xeaa\x88\x11\xf0<(E\xd9\xfc\xa6\xe5\xfah!Qkh\xbf\xa9', 0x1ff) [ 1923.236619][T16594] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1923.264590][T16594] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1923.351911][T16603] FAULT_INJECTION: forcing a failure. [ 1923.351911][T16603] name failslab, interval 1, probability 0, space 0, times 0 [ 1923.365099][T16603] CPU: 0 PID: 16603 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1923.373797][T16603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1923.383868][T16603] Call Trace: [ 1923.387183][T16603] dump_stack+0x197/0x210 [ 1923.391810][T16603] should_fail.cold+0xa/0x15 [ 1923.396521][T16603] ? fault_create_debugfs_attr+0x180/0x180 [ 1923.402345][T16603] ? ___might_sleep+0x163/0x2c0 [ 1923.408525][T16603] __should_failslab+0x121/0x190 [ 1923.413483][T16603] should_failslab+0x9/0x14 [ 1923.418005][T16603] kmem_cache_alloc_node_trace+0x274/0x750 [ 1923.423828][T16603] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1923.429565][T16603] ? apply_to_page_range+0x562/0x700 [ 1923.434881][T16603] __get_vm_area_node+0x12b/0x4f0 [ 1923.439949][T16603] __vmalloc_node_range+0xd4/0x810 [ 1923.445086][T16603] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1923.449937][T16603] __vmalloc+0x44/0x50 [ 1923.454030][T16603] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1923.458837][T16603] pcpu_mem_zalloc+0x8a/0xf0 [ 1923.463448][T16603] pcpu_create_chunk+0x196/0x7f0 [ 1923.468412][T16603] pcpu_alloc+0x10f3/0x1380 [ 1923.472952][T16603] ? pcpu_alloc_area+0x820/0x820 [ 1923.477927][T16603] __alloc_percpu_gfp+0x28/0x30 [ 1923.482795][T16603] array_map_alloc+0x698/0x7d0 [ 1923.487585][T16603] ? array_of_map_free+0x50/0x50 [ 1923.492552][T16603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1923.498825][T16603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.505199][T16603] ? array_of_map_free+0x50/0x50 [ 1923.510154][T16603] __do_sys_bpf+0x478/0x3810 [ 1923.514793][T16603] ? bpf_prog_load+0x18f0/0x18f0 [ 1923.519743][T16603] ? __kasan_check_write+0x14/0x20 [ 1923.524882][T16603] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1923.530448][T16603] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1923.536020][T16603] ? wait_for_completion+0x440/0x440 [ 1923.541331][T16603] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1923.547615][T16603] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1923.553101][T16603] ? do_syscall_64+0x26/0x790 [ 1923.557796][T16603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1923.563880][T16603] ? do_syscall_64+0x26/0x790 [ 1923.568583][T16603] __x64_sys_bpf+0x73/0xb0 [ 1923.573021][T16603] do_syscall_64+0xfa/0x790 [ 1923.577657][T16603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1923.583557][T16603] RIP: 0033:0x45a919 [ 1923.587465][T16603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1923.607081][T16603] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1923.615511][T16603] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1923.623496][T16603] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1923.631505][T16603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1923.639492][T16603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1923.647484][T16603] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:46:09 executing program 2 (fault-call:4 fault-nth:28): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:09 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2100c0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8949, &(0x7f00000001c0)='bond0\x00') ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000000c0)={r1}) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000040)=r5, 0xab) sendmsg(r4, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x92, 0x0}, 0x20000000) 22:46:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socket$kcm(0x21, 0x0, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='&vboxnet1proc\x97wlan0cgroup}@\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:46:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1923.886557][T16616] FAULT_INJECTION: forcing a failure. [ 1923.886557][T16616] name failslab, interval 1, probability 0, space 0, times 0 [ 1923.995821][T16616] CPU: 1 PID: 16616 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1924.004550][T16616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1924.014616][T16616] Call Trace: [ 1924.017928][T16616] dump_stack+0x197/0x210 [ 1924.022277][T16616] should_fail.cold+0xa/0x15 [ 1924.026888][T16616] ? fault_create_debugfs_attr+0x180/0x180 [ 1924.032821][T16616] ? ___might_sleep+0x163/0x2c0 [ 1924.037698][T16616] __should_failslab+0x121/0x190 [ 1924.042662][T16616] should_failslab+0x9/0x14 [ 1924.047182][T16616] kmem_cache_alloc_node+0x268/0x740 [ 1924.053357][T16616] ? ___might_sleep+0x163/0x2c0 [ 1924.058240][T16616] alloc_vmap_area+0x147/0x2030 [ 1924.063106][T16616] ? __get_vm_area_node+0x12b/0x4f0 [ 1924.068326][T16616] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1924.074247][T16616] ? purge_vmap_area_lazy+0x40/0x40 [ 1924.079465][T16616] ? apply_to_page_range+0x562/0x700 [ 1924.084821][T16616] __get_vm_area_node+0x179/0x4f0 [ 1924.090132][T16616] __vmalloc_node_range+0xd4/0x810 [ 1924.095256][T16616] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1924.100047][T16616] __vmalloc+0x44/0x50 [ 1924.104154][T16616] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1924.108934][T16616] pcpu_mem_zalloc+0x8a/0xf0 [ 1924.113536][T16616] pcpu_create_chunk+0x196/0x7f0 [ 1924.119011][T16616] pcpu_alloc+0x10f3/0x1380 [ 1924.123536][T16616] ? pcpu_alloc_area+0x820/0x820 [ 1924.128504][T16616] __alloc_percpu_gfp+0x28/0x30 [ 1924.133371][T16616] array_map_alloc+0x698/0x7d0 [ 1924.138156][T16616] ? array_of_map_free+0x50/0x50 [ 1924.143111][T16616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1924.149360][T16616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.155614][T16616] ? array_of_map_free+0x50/0x50 [ 1924.160575][T16616] __do_sys_bpf+0x478/0x3810 [ 1924.165273][T16616] ? bpf_prog_load+0x18f0/0x18f0 [ 1924.170228][T16616] ? __kasan_check_write+0x14/0x20 [ 1924.175352][T16616] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1924.180909][T16616] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1924.186212][T16616] ? wait_for_completion+0x440/0x440 [ 1924.191517][T16616] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1924.197798][T16616] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1924.203273][T16616] ? do_syscall_64+0x26/0x790 [ 1924.207965][T16616] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.214044][T16616] ? do_syscall_64+0x26/0x790 [ 1924.219223][T16616] __x64_sys_bpf+0x73/0xb0 [ 1924.223683][T16616] do_syscall_64+0xfa/0x790 [ 1924.228292][T16616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.234189][T16616] RIP: 0033:0x45a919 [ 1924.238089][T16616] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1924.257699][T16616] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1924.266119][T16616] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1924.274099][T16616] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1924.282102][T16616] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:46:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x03', 0x1ff) 22:46:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:46:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) 22:46:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1924.290086][T16616] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1924.298058][T16616] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:10 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:10 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0045878, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r3, 0xab) sendmsg(r2, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) 22:46:10 executing program 2 (fault-call:4 fault-nth:29): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0x20, 0x1, 0xfb, 0x2, 0x0, 0x8, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x11040, 0x65abc4ed, 0x6, 0x5, 0x400, 0xfffffff8, 0xfffd}) [ 1924.530209][T16647] FAULT_INJECTION: forcing a failure. [ 1924.530209][T16647] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.600138][T16647] CPU: 0 PID: 16647 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1924.608859][T16647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1924.618930][T16647] Call Trace: [ 1924.622238][T16647] dump_stack+0x197/0x210 [ 1924.626594][T16647] should_fail.cold+0xa/0x15 [ 1924.631210][T16647] ? fault_create_debugfs_attr+0x180/0x180 [ 1924.637049][T16647] ? ___might_sleep+0x163/0x2c0 [ 1924.641915][T16647] __should_failslab+0x121/0x190 [ 1924.646864][T16647] should_failslab+0x9/0x14 [ 1924.651375][T16647] kmem_cache_alloc_node+0x268/0x740 [ 1924.656665][T16647] ? ___might_sleep+0x163/0x2c0 [ 1924.661540][T16647] alloc_vmap_area+0x147/0x2030 [ 1924.666406][T16647] ? __get_vm_area_node+0x12b/0x4f0 [ 1924.671620][T16647] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1924.677190][T16647] ? purge_vmap_area_lazy+0x40/0x40 [ 1924.682398][T16647] ? apply_to_page_range+0x562/0x700 [ 1924.687702][T16647] __get_vm_area_node+0x179/0x4f0 [ 1924.692743][T16647] __vmalloc_node_range+0xd4/0x810 [ 1924.697947][T16647] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1924.702736][T16647] __vmalloc+0x44/0x50 [ 1924.706814][T16647] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1924.711587][T16647] pcpu_mem_zalloc+0x8a/0xf0 [ 1924.716190][T16647] pcpu_create_chunk+0x196/0x7f0 [ 1924.721150][T16647] pcpu_alloc+0x10f3/0x1380 [ 1924.725689][T16647] ? pcpu_alloc_area+0x820/0x820 [ 1924.725719][T16647] __alloc_percpu_gfp+0x28/0x30 [ 1924.725737][T16647] array_map_alloc+0x698/0x7d0 [ 1924.725759][T16647] ? array_of_map_free+0x50/0x50 [ 1924.725782][T16647] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1924.725796][T16647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.725811][T16647] ? array_of_map_free+0x50/0x50 [ 1924.725834][T16647] __do_sys_bpf+0x478/0x3810 [ 1924.740392][T16647] ? bpf_prog_load+0x18f0/0x18f0 [ 1924.740411][T16647] ? __kasan_check_write+0x14/0x20 [ 1924.740428][T16647] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1924.740449][T16647] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1924.788203][T16647] ? wait_for_completion+0x440/0x440 [ 1924.793517][T16647] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1924.799799][T16647] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1924.805282][T16647] ? do_syscall_64+0x26/0x790 [ 1924.809975][T16647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.816070][T16647] ? do_syscall_64+0x26/0x790 [ 1924.820776][T16647] __x64_sys_bpf+0x73/0xb0 [ 1924.825217][T16647] do_syscall_64+0xfa/0x790 [ 1924.829749][T16647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.835653][T16647] RIP: 0033:0x45a919 [ 1924.839569][T16647] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1924.859202][T16647] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1924.867630][T16647] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1924.875615][T16647] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1924.883594][T16647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1924.891579][T16647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 22:46:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() [ 1924.899567][T16647] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x0, 0x2) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8949, &(0x7f00000001c0)='bond0\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r2}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:46:11 executing program 2 (fault-call:4 fault-nth:30): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) gettid() 22:46:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000005005629340dcac5edb5fea737d9baeb2bc40004dfa0b0a62c000052000000070000000d0000000400000f02000000040000000700000007000000020000007f0000000180000003000000000000000010000005000000f7ffffffff7f0000b63c04000000010000060400000006000000471c0000000000610000330000477ceec92fe9e69b4b4d41a1a74c57cb6c1265869f2c802a815df9bcfbafc2511bf7d427c8c93149b554253486be65b9897191d26e493091c9098ed4fe2653365995bc919f9babc93bb5b2294fcf8cd666402acbf7cbe7d738f087804ed044768e4fc3f72316cba9e0fb56e2e756d71f7f92dfe36cc2b75a025a2312a8f1059bea94aa97b6a2a3a398a4eaed872f811dde193491c9a36bd6d8cc7d84fb44c1b845b183dde40aa5a0cfc6acf5d344033f9b3d187cf09e3f8e6ca33101e6e825ea5e579b1c559796d76f9a6f74d85ab39f37315c8490e00b62b8b1736dcea9f23949c9c0c0baa4253875c0f9c809a08b324d9106d6297abd405ed5e0c5f14fcc54af680f702166e791c71b4f0591df5e882a45787ac98e144dbd9de3729f95768ad2394c65e5615d24cbdee09ded988eb02bc721ba5f5b79d8a7599a76c1e4"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r2, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r4}}, 0x10) 22:46:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000440)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) [ 1925.036283][T16659] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1925.048892][T16659] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1925.122692][T16664] FAULT_INJECTION: forcing a failure. [ 1925.122692][T16664] name failslab, interval 1, probability 0, space 0, times 0 [ 1925.174681][T16664] CPU: 1 PID: 16664 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1925.183394][T16664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1925.193459][T16664] Call Trace: [ 1925.196859][T16664] dump_stack+0x197/0x210 [ 1925.201217][T16664] should_fail.cold+0xa/0x15 [ 1925.205831][T16664] ? fault_create_debugfs_attr+0x180/0x180 [ 1925.211662][T16664] ? ___might_sleep+0x163/0x2c0 [ 1925.216538][T16664] __should_failslab+0x121/0x190 [ 1925.221502][T16664] should_failslab+0x9/0x14 [ 1925.226015][T16664] kmem_cache_alloc_node_trace+0x274/0x750 [ 1925.231832][T16664] ? do_raw_spin_unlock+0x178/0x270 [ 1925.237052][T16664] __kmalloc_node+0x3d/0x70 [ 1925.241572][T16664] __vmalloc_node_range+0x1db/0x810 [ 1925.246794][T16664] __vmalloc+0x44/0x50 [ 1925.250882][T16664] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1925.255636][T16664] pcpu_mem_zalloc+0x8a/0xf0 [ 1925.260223][T16664] pcpu_create_chunk+0x196/0x7f0 [ 1925.265148][T16664] pcpu_alloc+0x10f3/0x1380 [ 1925.269656][T16664] ? pcpu_alloc_area+0x820/0x820 [ 1925.274726][T16664] __alloc_percpu_gfp+0x28/0x30 [ 1925.279572][T16664] array_map_alloc+0x698/0x7d0 [ 1925.284332][T16664] ? array_of_map_free+0x50/0x50 [ 1925.289281][T16664] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1925.295519][T16664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.301780][T16664] ? array_of_map_free+0x50/0x50 [ 1925.306735][T16664] __do_sys_bpf+0x478/0x3810 [ 1925.311357][T16664] ? bpf_prog_load+0x18f0/0x18f0 [ 1925.316312][T16664] ? __kasan_check_write+0x14/0x20 [ 1925.321445][T16664] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1925.327009][T16664] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1925.332315][T16664] ? wait_for_completion+0x440/0x440 [ 1925.337611][T16664] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1925.343904][T16664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1925.349380][T16664] ? do_syscall_64+0x26/0x790 [ 1925.354057][T16664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.360106][T16664] ? do_syscall_64+0x26/0x790 [ 1925.364779][T16664] __x64_sys_bpf+0x73/0xb0 [ 1925.369196][T16664] do_syscall_64+0xfa/0x790 [ 1925.373707][T16664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.379604][T16664] RIP: 0033:0x45a919 [ 1925.383546][T16664] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1925.403225][T16664] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1925.411627][T16664] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 22:46:11 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r3, 0x10, &(0x7f0000000140)={&(0x7f00000016c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x31d) 22:46:11 executing program 2 (fault-call:4 fault-nth:31): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1925.419591][T16664] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1925.427551][T16664] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1925.435522][T16664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1925.443498][T16664] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000026c0)=""/204, 0x73, 0xcc}, 0x20) 22:46:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x10) [ 1925.632289][T16689] FAULT_INJECTION: forcing a failure. [ 1925.632289][T16689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1925.639916][T16691] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1925.658865][T16691] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1925.688485][T16689] CPU: 1 PID: 16689 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1925.697217][T16689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1925.707269][T16689] Call Trace: [ 1925.707295][T16689] dump_stack+0x197/0x210 [ 1925.707321][T16689] should_fail.cold+0xa/0x15 [ 1925.707341][T16689] ? fault_create_debugfs_attr+0x180/0x180 [ 1925.707361][T16689] ? ___might_sleep+0x163/0x2c0 [ 1925.730188][T16689] should_fail_alloc_page+0x50/0x60 [ 1925.735394][T16689] __alloc_pages_nodemask+0x1a1/0x910 [ 1925.735413][T16689] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1925.735431][T16689] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1925.735455][T16689] ? kasan_unpoison_shadow+0x35/0x50 [ 1925.735472][T16689] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1925.735492][T16689] alloc_pages_current+0x107/0x210 [ 1925.768812][T16689] __vmalloc_node_range+0x4f8/0x810 [ 1925.774043][T16689] __vmalloc+0x44/0x50 [ 1925.778148][T16689] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1925.782920][T16689] pcpu_mem_zalloc+0x8a/0xf0 [ 1925.787522][T16689] pcpu_create_chunk+0x196/0x7f0 [ 1925.792477][T16689] pcpu_alloc+0x10f3/0x1380 [ 1925.796999][T16689] ? pcpu_alloc_area+0x820/0x820 [ 1925.801956][T16689] __alloc_percpu_gfp+0x28/0x30 [ 1925.806827][T16689] array_map_alloc+0x698/0x7d0 [ 1925.806849][T16689] ? array_of_map_free+0x50/0x50 [ 1925.806869][T16689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1925.806882][T16689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.806900][T16689] ? array_of_map_free+0x50/0x50 [ 1925.833995][T16689] __do_sys_bpf+0x478/0x3810 [ 1925.838620][T16689] ? bpf_prog_load+0x18f0/0x18f0 [ 1925.843577][T16689] ? __kasan_check_write+0x14/0x20 [ 1925.848703][T16689] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1925.854264][T16689] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1925.859572][T16689] ? wait_for_completion+0x440/0x440 [ 1925.864887][T16689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1925.871163][T16689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1925.876655][T16689] ? do_syscall_64+0x26/0x790 [ 1925.881350][T16689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.887436][T16689] ? do_syscall_64+0x26/0x790 [ 1925.892146][T16689] __x64_sys_bpf+0x73/0xb0 [ 1925.896583][T16689] do_syscall_64+0xfa/0x790 [ 1925.901113][T16689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.907013][T16689] RIP: 0033:0x45a919 [ 1925.910965][T16689] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1925.930670][T16689] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 22:46:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) 22:46:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) 22:46:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0xffffffffffffff30, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x410, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) [ 1925.939118][T16689] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1925.947095][T16689] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1925.947103][T16689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1925.947112][T16689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1925.947120][T16689] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x10000, 0x9, 0x6, 0x32, r0, 0x7, [], 0x0, r3, 0x0, 0x4}, 0x3c) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:12 executing program 2 (fault-call:4 fault-nth:32): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x29, 0xe9fa99a986c5e77d, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) [ 1926.222654][T16714] FAULT_INJECTION: forcing a failure. [ 1926.222654][T16714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1926.264685][T16714] CPU: 0 PID: 16714 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1926.273407][T16714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1926.283472][T16714] Call Trace: [ 1926.286804][T16714] dump_stack+0x197/0x210 [ 1926.291160][T16714] should_fail.cold+0xa/0x15 [ 1926.295772][T16714] ? fault_create_debugfs_attr+0x180/0x180 [ 1926.301591][T16714] ? ___might_sleep+0x163/0x2c0 [ 1926.306475][T16714] should_fail_alloc_page+0x50/0x60 [ 1926.311685][T16714] __alloc_pages_nodemask+0x1a1/0x910 [ 1926.317090][T16714] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1926.322658][T16714] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1926.328405][T16714] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1926.334661][T16714] alloc_pages_current+0x107/0x210 [ 1926.339799][T16714] ? ___might_sleep+0x163/0x2c0 [ 1926.344659][T16714] __vmalloc_node_range+0x4f8/0x810 [ 1926.349870][T16714] __vmalloc+0x44/0x50 [ 1926.353955][T16714] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1926.358733][T16714] pcpu_mem_zalloc+0x8a/0xf0 [ 1926.363333][T16714] pcpu_create_chunk+0x196/0x7f0 [ 1926.368293][T16714] pcpu_alloc+0x10f3/0x1380 [ 1926.372824][T16714] ? pcpu_alloc_area+0x820/0x820 [ 1926.377788][T16714] __alloc_percpu_gfp+0x28/0x30 [ 1926.382641][T16714] array_map_alloc+0x698/0x7d0 [ 1926.387423][T16714] ? array_of_map_free+0x50/0x50 [ 1926.392376][T16714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1926.398692][T16714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.404932][T16714] ? array_of_map_free+0x50/0x50 [ 1926.409874][T16714] __do_sys_bpf+0x478/0x3810 [ 1926.415298][T16714] ? bpf_prog_load+0x18f0/0x18f0 [ 1926.420251][T16714] ? __kasan_check_write+0x14/0x20 [ 1926.425381][T16714] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1926.430941][T16714] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1926.436241][T16714] ? wait_for_completion+0x440/0x440 [ 1926.441545][T16714] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1926.447812][T16714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1926.453279][T16714] ? do_syscall_64+0x26/0x790 [ 1926.457963][T16714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1926.464037][T16714] ? do_syscall_64+0x26/0x790 [ 1926.468706][T16714] __x64_sys_bpf+0x73/0xb0 [ 1926.473113][T16714] do_syscall_64+0xfa/0x790 [ 1926.477603][T16714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1926.483478][T16714] RIP: 0033:0x45a919 [ 1926.487366][T16714] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1926.506973][T16714] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 22:46:12 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) 22:46:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 22:46:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006dc65600027920"], 0xda00) [ 1926.515392][T16714] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1926.523424][T16714] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1926.531381][T16714] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1926.539348][T16714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1926.547315][T16714] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:12 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:12 executing program 2 (fault-call:4 fault-nth:33): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r3, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:12 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) [ 1926.721596][T16739] FAULT_INJECTION: forcing a failure. [ 1926.721596][T16739] name failslab, interval 1, probability 0, space 0, times 0 [ 1926.784021][T16739] CPU: 0 PID: 16739 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1926.792741][T16739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1926.802814][T16739] Call Trace: [ 1926.806133][T16739] dump_stack+0x197/0x210 [ 1926.810496][T16739] should_fail.cold+0xa/0x15 [ 1926.815114][T16739] ? fault_create_debugfs_attr+0x180/0x180 [ 1926.820935][T16739] ? ___might_sleep+0x163/0x2c0 [ 1926.825788][T16739] __should_failslab+0x121/0x190 [ 1926.825806][T16739] should_failslab+0x9/0x14 [ 1926.825818][T16739] __kmalloc+0x2e0/0x770 [ 1926.825841][T16739] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1926.825860][T16739] pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1926.825875][T16739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.825888][T16739] ? __vmalloc_node_range+0x4d7/0x810 [ 1926.825924][T16739] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1926.867944][T16739] pcpu_create_chunk+0x24e/0x7f0 [ 1926.872904][T16739] pcpu_alloc+0x10f3/0x1380 [ 1926.877459][T16739] ? pcpu_alloc_area+0x820/0x820 [ 1926.882425][T16739] __alloc_percpu_gfp+0x28/0x30 [ 1926.887289][T16739] array_map_alloc+0x698/0x7d0 [ 1926.892073][T16739] ? array_of_map_free+0x50/0x50 [ 1926.897039][T16739] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1926.903291][T16739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.909549][T16739] ? array_of_map_free+0x50/0x50 [ 1926.914506][T16739] __do_sys_bpf+0x478/0x3810 [ 1926.919123][T16739] ? bpf_prog_load+0x18f0/0x18f0 [ 1926.924086][T16739] ? __kasan_check_write+0x14/0x20 [ 1926.929221][T16739] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1926.934783][T16739] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1926.940110][T16739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1926.946357][T16739] ? debug_smp_processor_id+0x33/0x18a [ 1926.946375][T16739] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1926.946410][T16739] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1926.946426][T16739] ? do_syscall_64+0x26/0x790 [ 1926.946448][T16739] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1926.946461][T16739] ? do_syscall_64+0x26/0x790 [ 1926.946486][T16739] __x64_sys_bpf+0x73/0xb0 [ 1926.946504][T16739] do_syscall_64+0xfa/0x790 [ 1926.946525][T16739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1926.993744][T16739] RIP: 0033:0x45a919 [ 1926.997650][T16739] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1927.017263][T16739] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1927.025695][T16739] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 22:46:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7, 0x20, 0x3f, 0x0, 0x0, 0xcd37, 0x20e, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x6b5bafc6, 0x2}, 0x8000, 0x1f, 0x1, 0x2, 0x0, 0x5, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selfvmnet1-keyringmime_type\x00') socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d256d00027920"], 0xda00) 22:46:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) [ 1927.033700][T16739] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1927.041689][T16739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1927.049758][T16739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1927.057757][T16739] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:13 executing program 2 (fault-call:4 fault-nth:34): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 1927.240060][T16762] validate_nla: 2 callbacks suppressed [ 1927.240072][T16762] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 1927.255037][T16762] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1927.291405][T16763] FAULT_INJECTION: forcing a failure. [ 1927.291405][T16763] name failslab, interval 1, probability 0, space 0, times 0 [ 1927.323446][T16763] CPU: 0 PID: 16763 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1927.332163][T16763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1927.342230][T16763] Call Trace: [ 1927.345537][T16763] dump_stack+0x197/0x210 [ 1927.349887][T16763] should_fail.cold+0xa/0x15 [ 1927.354495][T16763] ? fault_create_debugfs_attr+0x180/0x180 [ 1927.360321][T16763] ? ___might_sleep+0x163/0x2c0 [ 1927.365194][T16763] __should_failslab+0x121/0x190 [ 1927.370145][T16763] should_failslab+0x9/0x14 [ 1927.374657][T16763] kmem_cache_alloc+0x2aa/0x710 [ 1927.379507][T16763] ? memset+0x40/0x40 [ 1927.383475][T16763] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1927.388686][T16763] pcpu_get_vm_areas+0x49e/0x3ee0 [ 1927.393713][T16763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.399959][T16763] ? __vmalloc_node_range+0x4d7/0x810 [ 1927.405376][T16763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1927.411634][T16763] pcpu_create_chunk+0x24e/0x7f0 [ 1927.416585][T16763] pcpu_alloc+0x10f3/0x1380 [ 1927.416612][T16763] ? pcpu_alloc_area+0x820/0x820 [ 1927.416641][T16763] __alloc_percpu_gfp+0x28/0x30 [ 1927.416660][T16763] array_map_alloc+0x698/0x7d0 [ 1927.416682][T16763] ? array_of_map_free+0x50/0x50 [ 1927.416705][T16763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1927.426131][T16763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1927.426150][T16763] ? array_of_map_free+0x50/0x50 [ 1927.426171][T16763] __do_sys_bpf+0x478/0x3810 [ 1927.426191][T16763] ? bpf_prog_load+0x18f0/0x18f0 [ 1927.426207][T16763] ? __kasan_check_write+0x14/0x20 [ 1927.426224][T16763] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1927.426241][T16763] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1927.426259][T16763] ? wait_for_completion+0x440/0x440 [ 1927.426283][T16763] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1927.495227][T16763] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1927.500705][T16763] ? do_syscall_64+0x26/0x790 [ 1927.505401][T16763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1927.511509][T16763] ? do_syscall_64+0x26/0x790 [ 1927.516211][T16763] __x64_sys_bpf+0x73/0xb0 [ 1927.520630][T16763] do_syscall_64+0xfa/0x790 [ 1927.525137][T16763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1927.531034][T16763] RIP: 0033:0x45a919 22:46:13 executing program 1: socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x5, 0xc1efbf4150dfe232, 0x20, &(0x7f00000000c0)) socketpair(0x2, 0x4, 0x61, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000a80)={&(0x7f0000000180)=@l2, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/213, 0xd5}, {&(0x7f0000000380)=""/55, 0x37}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/166, 0xa6}, {&(0x7f0000000600)=""/202, 0xca}, {&(0x7f0000000700)=""/9, 0x9}, {&(0x7f0000000740)=""/66, 0x42}], 0x7, &(0x7f00000009c0)=""/144, 0x90}, 0xa0010023) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r2, 0xab) sendmsg(r1, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) 22:46:13 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x7, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="006d256d000279200000000011f0b898c490f7334cbb671c39a6244893aaced38d7415854790d9a7fe505ca314c7332319e387b6152c4f61f76779819100000000"], 0xda00) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='lo@system\xa5:vmnet1posix_acl_access\x00', r1}, 0x10) [ 1927.534935][T16763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1927.555086][T16763] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1927.563518][T16763] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1927.571517][T16763] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1927.579509][T16763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1927.587509][T16763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1927.587519][T16763] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:13 executing program 4: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:13 executing program 2 (fault-call:4 fault-nth:35): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:13 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) 22:46:14 executing program 1: socket$kcm(0x2b, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='\x00', r0}, 0x10) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0045878, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000280)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'team_slave_0\x00', 0x600}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r4 = socket$kcm(0x2, 0x200000000000001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f0000000040)=r5, 0xab) sendmsg(r4, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) 22:46:14 executing program 4: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) [ 1927.950254][T16800] FAULT_INJECTION: forcing a failure. [ 1927.950254][T16800] name failslab, interval 1, probability 0, space 0, times 0 [ 1927.962187][T16803] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 22:46:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0xda00) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0045878, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x312) [ 1928.003505][T16803] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 1928.019289][T16800] CPU: 1 PID: 16800 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1928.028031][T16800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1928.038987][T16800] Call Trace: [ 1928.042303][T16800] dump_stack+0x197/0x210 [ 1928.046823][T16800] should_fail.cold+0xa/0x15 [ 1928.051447][T16800] ? fault_create_debugfs_attr+0x180/0x180 [ 1928.057479][T16800] ? ___might_sleep+0x163/0x2c0 [ 1928.062536][T16800] __should_failslab+0x121/0x190 [ 1928.067500][T16800] should_failslab+0x9/0x14 [ 1928.072121][T16800] kmem_cache_alloc_trace+0x2d3/0x790 [ 1928.077617][T16800] ? kmem_cache_alloc+0x364/0x710 [ 1928.082763][T16800] ? memset+0x40/0x40 [ 1928.086764][T16800] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1928.092020][T16800] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 1928.097057][T16800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.103312][T16800] ? __vmalloc_node_range+0x4d7/0x810 [ 1928.108745][T16800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1928.115003][T16800] pcpu_create_chunk+0x24e/0x7f0 [ 1928.120049][T16800] pcpu_alloc+0x10f3/0x1380 [ 1928.124588][T16800] ? pcpu_alloc_area+0x820/0x820 [ 1928.129642][T16800] __alloc_percpu_gfp+0x28/0x30 [ 1928.134607][T16800] array_map_alloc+0x698/0x7d0 [ 1928.139397][T16800] ? array_of_map_free+0x50/0x50 [ 1928.144356][T16800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1928.150615][T16800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.156876][T16800] ? array_of_map_free+0x50/0x50 [ 1928.161838][T16800] __do_sys_bpf+0x478/0x3810 [ 1928.166542][T16800] ? bpf_prog_load+0x18f0/0x18f0 [ 1928.171508][T16800] ? __kasan_check_write+0x14/0x20 [ 1928.176807][T16800] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1928.182697][T16800] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1928.188005][T16800] ? wait_for_completion+0x440/0x440 [ 1928.193313][T16800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 22:46:14 executing program 4: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:14 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:14 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) [ 1928.200025][T16800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1928.205587][T16800] ? do_syscall_64+0x26/0x790 [ 1928.210375][T16800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1928.216464][T16800] ? do_syscall_64+0x26/0x790 [ 1928.221171][T16800] __x64_sys_bpf+0x73/0xb0 [ 1928.225621][T16800] do_syscall_64+0xfa/0x790 [ 1928.230165][T16800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1928.236078][T16800] RIP: 0033:0x45a919 [ 1928.239984][T16800] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1928.259789][T16800] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1928.259805][T16800] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1928.259813][T16800] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1928.259821][T16800] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1928.259829][T16800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1928.259837][T16800] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 22:46:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) 22:46:14 executing program 2 (fault-call:4 fault-nth:36): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 22:46:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={r0, r1, 0x9}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000029000504d25a80648c63940d0224fc60100009400a000400030082c137153e370900018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) socket$kcm(0x10, 0x2, 0x0) 22:46:14 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000000040)=[{&(0x7f0000000300)="480000001500e702b05f9f95274b0a000a840000400403fe0500030001546fab07004e7d063630f10a8a6a36d47a56aa68c6f8c36da6bd7c497626ff19343dcdbfae0000000000d9", 0x48}], 0x1}, 0x0) 22:46:14 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) gettid() r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) [ 1928.556765][T16829] FAULT_INJECTION: forcing a failure. [ 1928.556765][T16829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1928.600874][T16829] CPU: 1 PID: 16829 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1928.609610][T16829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1928.619757][T16829] Call Trace: [ 1928.619782][T16829] dump_stack+0x197/0x210 [ 1928.619809][T16829] should_fail.cold+0xa/0x15 [ 1928.619830][T16829] ? fault_create_debugfs_attr+0x180/0x180 [ 1928.619851][T16829] ? ___might_sleep+0x163/0x2c0 [ 1928.642728][T16829] should_fail_alloc_page+0x50/0x60 [ 1928.647976][T16829] __alloc_pages_nodemask+0x1a1/0x910 [ 1928.653392][T16829] ? pcpu_get_vm_areas+0x2b6f/0x3ee0 [ 1928.658710][T16829] ? pcpu_create_chunk+0x24e/0x7f0 [ 1928.663844][T16829] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1928.669577][T16829] ? debug_check_no_obj_freed+0x20a/0x43f [ 1928.675317][T16829] ? __kasan_check_read+0x11/0x20 [ 1928.680352][T16829] ? __lock_acquire+0x16f2/0x4a00 [ 1928.685403][T16829] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1928.691649][T16829] alloc_pages_current+0x107/0x210 [ 1928.691669][T16829] __get_free_pages+0xc/0x40 [ 1928.691689][T16829] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1928.707047][T16829] apply_to_page_range+0x445/0x700 [ 1928.712177][T16829] ? memset+0x40/0x40 [ 1928.716184][T16829] kasan_populate_vmalloc+0x68/0x90 [ 1928.721390][T16829] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 1928.726516][T16829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.732804][T16829] pcpu_create_chunk+0x24e/0x7f0 [ 1928.737760][T16829] pcpu_alloc+0x10f3/0x1380 [ 1928.742291][T16829] ? pcpu_alloc_area+0x820/0x820 [ 1928.747261][T16829] __alloc_percpu_gfp+0x28/0x30 [ 1928.752128][T16829] array_map_alloc+0x698/0x7d0 [ 1928.756916][T16829] ? array_of_map_free+0x50/0x50 [ 1928.761877][T16829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1928.768158][T16829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1928.768179][T16829] ? array_of_map_free+0x50/0x50 [ 1928.779347][T16829] __do_sys_bpf+0x478/0x3810 [ 1928.783990][T16829] ? bpf_prog_load+0x18f0/0x18f0 [ 1928.788943][T16829] ? __kasan_check_write+0x14/0x20 [ 1928.788962][T16829] ? __mutex_unlock_slowpath+0xf0/0x6a0 22:46:15 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x10, 0x6, 0x0, 0x0, 0x0, 0x7543, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={&(0x7f0000000080), 0x2}, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, r1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x3, 0xc}, &(0x7f00000002c0)=0x800100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, [@call={0x85, 0x0, 0x0, 0x5}, @exit, @ldst={0x2, 0x0, 0x2, 0x9, 0x0, 0x30, 0x10}, @ldst={0x2, 0x0, 0x3, 0x7, 0x5, 0x2}]}, &(0x7f0000000180)='syzkaller\x00', 0x7, 0x85, &(0x7f0000000280)=""/133, 0x40f00, 0x17, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000380)={0x2, 0x5, 0x6c6, 0xfff}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/4089, 0xff9, r2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r1, 0x10, &(0x7f00000001c0)={&(0x7f00000000c0)=""/86, 0x56, r3}}, 0x10) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d20010002e000080", 0x14}], 0x1}, 0x0) [ 1928.788982][T16829] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1928.805037][T16829] ? wait_for_completion+0x440/0x440 [ 1928.810378][T16829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1928.816655][T16829] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1928.822136][T16829] ? do_syscall_64+0x26/0x790 [ 1928.826830][T16829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1928.833000][T16829] ? do_syscall_64+0x26/0x790 [ 1928.837707][T16829] __x64_sys_bpf+0x73/0xb0 [ 1928.842153][T16829] do_syscall_64+0xfa/0x790 [ 1928.846677][T16829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1928.852578][T16829] RIP: 0033:0x45a919 [ 1928.856484][T16829] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1928.876205][T16829] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1928.876221][T16829] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1928.876230][T16829] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1928.876238][T16829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1928.876251][T16829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1928.876267][T16829] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 1928.962923][T16829] BUG: unable to handle page fault for address: fffff91ffff00000 [ 1928.965450][ T4085] kobject: 'loop4' (000000004d84ff8f): kobject_uevent_env [ 1928.970821][T16829] #PF: supervisor read access in kernel mode [ 1928.983891][T16829] #PF: error_code(0x0000) - not-present page [ 1928.989960][T16829] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 1928.997428][T16829] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1929.002615][T16829] CPU: 0 PID: 16829 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1929.011293][T16829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1929.021357][T16829] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1929.027278][T16829] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1929.046960][T16829] RSP: 0018:ffffc90001747a80 EFLAGS: 00010216 [ 1929.053028][T16829] RAX: fffff91ffff00000 RBX: fffff91ffff01000 RCX: ffffffff819e45a9 [ 1929.060985][T16829] RDX: 0000000000000001 RSI: 0000000000008000 RDI: ffffe8ffff800000 [ 1929.068944][T16829] RBP: ffffc90001747a98 R08: fffff91ffff01000 R09: 0000000000001000 [ 1929.076898][T16829] R10: fffff91ffff00fff R11: ffffe8ffff807fff R12: fffff91ffff00000 [ 1929.084853][T16829] R13: 0000000000008000 R14: 0000000000000000 R15: ffff88821fffd100 [ 1929.092810][T16829] FS: 00007ffb4df9d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1929.102428][T16829] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1929.108995][T16829] CR2: fffff91ffff00000 CR3: 0000000064c8f000 CR4: 00000000001406f0 [ 1929.117109][T16829] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1929.125081][T16829] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1929.133041][T16829] Call Trace: [ 1929.136333][T16829] memset+0x24/0x40 [ 1929.140146][T16829] pcpu_alloc+0x589/0x1380 [ 1929.144646][T16829] ? pcpu_alloc_area+0x820/0x820 [ 1929.149586][T16829] __alloc_percpu_gfp+0x28/0x30 [ 1929.154429][T16829] array_map_alloc+0x698/0x7d0 [ 1929.159183][T16829] ? array_of_map_free+0x50/0x50 [ 1929.164147][T16829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1929.170388][T16829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1929.176637][T16829] ? array_of_map_free+0x50/0x50 [ 1929.181572][T16829] __do_sys_bpf+0x478/0x3810 [ 1929.186170][T16829] ? bpf_prog_load+0x18f0/0x18f0 [ 1929.191093][T16829] ? __kasan_check_write+0x14/0x20 [ 1929.196194][T16829] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1929.201727][T16829] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1929.207013][T16829] ? wait_for_completion+0x440/0x440 [ 1929.212297][T16829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1929.218543][T16829] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1929.223993][T16829] ? do_syscall_64+0x26/0x790 [ 1929.228658][T16829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1929.234713][T16829] ? do_syscall_64+0x26/0x790 [ 1929.239392][T16829] __x64_sys_bpf+0x73/0xb0 [ 1929.243815][T16829] do_syscall_64+0xfa/0x790 [ 1929.248315][T16829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1929.254196][T16829] RIP: 0033:0x45a919 [ 1929.258176][T16829] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1929.277770][T16829] RSP: 002b:00007ffb4df9cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1929.286275][T16829] RAX: ffffffffffffffda RBX: 00007ffb4df9cc90 RCX: 000000000045a919 [ 1929.294251][T16829] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0c00000000000000 [ 1929.302230][T16829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1929.310193][T16829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb4df9d6d4 [ 1929.318178][T16829] R13: 00000000004c0efb R14: 00000000004d4b30 R15: 0000000000000004 [ 1929.326152][T16829] Modules linked in: [ 1929.330033][T16829] CR2: fffff91ffff00000 [ 1929.334178][T16829] ---[ end trace a8a75ca1df5e6d4f ]--- [ 1929.339641][T16829] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1929.345446][T16829] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1929.365137][T16829] RSP: 0018:ffffc90001747a80 EFLAGS: 00010216 [ 1929.371207][T16829] RAX: fffff91ffff00000 RBX: fffff91ffff01000 RCX: ffffffff819e45a9 [ 1929.379289][T16829] RDX: 0000000000000001 RSI: 0000000000008000 RDI: ffffe8ffff800000 [ 1929.387254][T16829] RBP: ffffc90001747a98 R08: fffff91ffff01000 R09: 0000000000001000 [ 1929.395477][T16829] R10: fffff91ffff00fff R11: ffffe8ffff807fff R12: fffff91ffff00000 [ 1929.403437][T16829] R13: 0000000000008000 R14: 0000000000000000 R15: ffff88821fffd100 [ 1929.411396][T16829] FS: 00007ffb4df9d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1929.420679][T16829] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1929.427249][T16829] CR2: fffff91ffff00000 CR3: 0000000064c8f000 CR4: 00000000001406f0 [ 1929.435210][T16829] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1929.443168][T16829] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1929.451150][T16829] Kernel panic - not syncing: Fatal exception [ 1929.458716][T16829] Kernel Offset: disabled [ 1929.463048][T16829] Rebooting in 86400 seconds..