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", 0xca3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @multicast1}}}], 0x20}, 0x4000) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) recvmsg$unix(r8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x100d}], 0x1}, 0x2002) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400), 0x0, &(0x7f0000002bc0)=ANY=[@ANYBLOB="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"], 0x58}, 0x4000) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000200)='cpuacct.usage_sys\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.effective_mems\x00', 0x26e1, 0x0) syz_clone(0x670c8680, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:12 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {&(0x7f0000000540)="e8", 0x1}], 0x3}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7, 0x8, 0x5, 0x40, 0x4b, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pI4 \x00'}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r7 = syz_clone(0x40000000, &(0x7f0000000680)="5492a6bd44d991b90fa70b81728f351df14b68aacfccb66ed51d7c15f402cb096ad89ceebc50659ae4ba5eda98eb7514847a5d3aa567a94224be5ae3ddd0f34fde7080d9ca0ba1608ab06256d91654c0065c0ee73099abdbb5e79c2bd1b437b15911de166f4e7eda91dd704a6f43f80e98305d562387a03defd63374b393734b04348e3b4191aacafb3c182c963449b2616716fa89a2b58239da31c71297f1252f67e66a874cdee1fadfd2bfa17f25014fd0c786ac64f57489a72f10c6f9356c883f67a50dc2", 0xc6, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="867e005518e25fdc12932efd3accb33a2b73c4c751b87b417dd98fa4bc1fb512fd2320ca45fd44cc1a9239") r8 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="512f7d38620fc2a3c5ea0c334859a26d41f9f01bda9cd200e1965442925c70c477959a7646a4b094e5a1a36f0457e1c516c6beee4c9f570ef1396ca032ebe98d84f98ab6fdeff228455034b4b183a4620e28ce09d9b9b561e8a7889824811196dd3f0f49b433b00a857318173388d6d1f22fec75386cf6cfdfa48eac6e1c36bc39cd50", 0x83}, {&(0x7f0000000180)="fcc8b7a86a51e417fd4fc9633f7e8ce540233fcafe7301474cd75d24c0bb24adf9c3cfbc1b8a728d131ae40e2deb93d237299e68ef00c21014c1437b773a51d431612b855bb4a68d6c038d1dc34dceb8d489588d567fc76a6af16c3fba7578981c6e555f17c2eb9e7b417318b1ac7acb84add78492889f05ec01d3aefe0131377b0aa1b82e7e53aa6c59ffef66ad7b6843be6293c643a195795a80f73d17e316c6067abdba24d8aeefb4bf963eb6cfbcaf6ae5aa021ff7881035ca42952b5d6ab05f4763d4cd50510e6d2bbf2274edcee8e841db06153aadf359a09caecd52dcec65b415f557c6276010a5bdf1ddb805", 0xf0}], 0x3, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r4, r0, r5, r6, r0, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00}}}], 0xb0, 0x804}, 0x8000) 12:23:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:12 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {&(0x7f0000000540)="e8", 0x1}], 0x3}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7, 0x8, 0x5, 0x40, 0x4b, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pI4 \x00'}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r7 = syz_clone(0x40000000, &(0x7f0000000680)="5492a6bd44d991b90fa70b81728f351df14b68aacfccb66ed51d7c15f402cb096ad89ceebc50659ae4ba5eda98eb7514847a5d3aa567a94224be5ae3ddd0f34fde7080d9ca0ba1608ab06256d91654c0065c0ee73099abdbb5e79c2bd1b437b15911de166f4e7eda91dd704a6f43f80e98305d562387a03defd63374b393734b04348e3b4191aacafb3c182c963449b2616716fa89a2b58239da31c71297f1252f67e66a874cdee1fadfd2bfa17f25014fd0c786ac64f57489a72f10c6f9356c883f67a50dc2", 0xc6, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="867e005518e25fdc12932efd3accb33a2b73c4c751b87b417dd98fa4bc1fb512fd2320ca45fd44cc1a9239") r8 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="512f7d38620fc2a3c5ea0c334859a26d41f9f01bda9cd200e1965442925c70c477959a7646a4b094e5a1a36f0457e1c516c6beee4c9f570ef1396ca032ebe98d84f98ab6fdeff228455034b4b183a4620e28ce09d9b9b561e8a7889824811196dd3f0f49b433b00a857318173388d6d1f22fec75386cf6cfdfa48eac6e1c36bc39cd50", 0x83}, {&(0x7f0000000180)="fcc8b7a86a51e417fd4fc9633f7e8ce540233fcafe7301474cd75d24c0bb24adf9c3cfbc1b8a728d131ae40e2deb93d237299e68ef00c21014c1437b773a51d431612b855bb4a68d6c038d1dc34dceb8d489588d567fc76a6af16c3fba7578981c6e555f17c2eb9e7b417318b1ac7acb84add78492889f05ec01d3aefe0131377b0aa1b82e7e53aa6c59ffef66ad7b6843be6293c643a195795a80f73d17e316c6067abdba24d8aeefb4bf963eb6cfbcaf6ae5aa021ff7881035ca42952b5d6ab05f4763d4cd50510e6d2bbf2274edcee8e841db06153aadf359a09caecd52dcec65b415f557c6276010a5bdf1ddb805", 0xf0}], 0x3, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r4, r0, r5, r6, r0, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00}}}], 0xb0, 0x804}, 0x8000) 12:23:12 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {&(0x7f0000000540)="e8", 0x1}], 0x3}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7, 0x8, 0x5, 0x40, 0x4b, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pI4 \x00'}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r7 = syz_clone(0x40000000, &(0x7f0000000680)="5492a6bd44d991b90fa70b81728f351df14b68aacfccb66ed51d7c15f402cb096ad89ceebc50659ae4ba5eda98eb7514847a5d3aa567a94224be5ae3ddd0f34fde7080d9ca0ba1608ab06256d91654c0065c0ee73099abdbb5e79c2bd1b437b15911de166f4e7eda91dd704a6f43f80e98305d562387a03defd63374b393734b04348e3b4191aacafb3c182c963449b2616716fa89a2b58239da31c71297f1252f67e66a874cdee1fadfd2bfa17f25014fd0c786ac64f57489a72f10c6f9356c883f67a50dc2", 0xc6, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="867e005518e25fdc12932efd3accb33a2b73c4c751b87b417dd98fa4bc1fb512fd2320ca45fd44cc1a9239") r8 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="512f7d38620fc2a3c5ea0c334859a26d41f9f01bda9cd200e1965442925c70c477959a7646a4b094e5a1a36f0457e1c516c6beee4c9f570ef1396ca032ebe98d84f98ab6fdeff228455034b4b183a4620e28ce09d9b9b561e8a7889824811196dd3f0f49b433b00a857318173388d6d1f22fec75386cf6cfdfa48eac6e1c36bc39cd50", 0x83}, {&(0x7f0000000180)="fcc8b7a86a51e417fd4fc9633f7e8ce540233fcafe7301474cd75d24c0bb24adf9c3cfbc1b8a728d131ae40e2deb93d237299e68ef00c21014c1437b773a51d431612b855bb4a68d6c038d1dc34dceb8d489588d567fc76a6af16c3fba7578981c6e555f17c2eb9e7b417318b1ac7acb84add78492889f05ec01d3aefe0131377b0aa1b82e7e53aa6c59ffef66ad7b6843be6293c643a195795a80f73d17e316c6067abdba24d8aeefb4bf963eb6cfbcaf6ae5aa021ff7881035ca42952b5d6ab05f4763d4cd50510e6d2bbf2274edcee8e841db06153aadf359a09caecd52dcec65b415f557c6276010a5bdf1ddb805", 0xf0}], 0x3, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r4, r0, r5, r6, r0, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00}}}], 0xb0, 0x804}, 0x8000) 12:23:13 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="1400000016000b63d25a80648c56915a13aa2bfe", 0x14}], 0x1}, 0x0) 12:23:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:13 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:13 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="1400000016000b63d25a80648c56915a13aa2bfe", 0x14}], 0x1}, 0x0) 12:23:13 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="1400000016000b63d25a80648c56915a13aa2bfe", 0x14}], 0x1}, 0x0) 12:23:13 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="1400000016000b63d25a80648c56915a13aa2bfe", 0x14}], 0x1}, 0x0) 12:23:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:14 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:14 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:15 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:15 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:15 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) [ 132.711175][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.717568][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 12:23:17 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {&(0x7f0000000540)="e8", 0x1}], 0x3}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7, 0x8, 0x5, 0x40, 0x4b, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pI4 \x00'}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r7 = syz_clone(0x40000000, &(0x7f0000000680)="5492a6bd44d991b90fa70b81728f351df14b68aacfccb66ed51d7c15f402cb096ad89ceebc50659ae4ba5eda98eb7514847a5d3aa567a94224be5ae3ddd0f34fde7080d9ca0ba1608ab06256d91654c0065c0ee73099abdbb5e79c2bd1b437b15911de166f4e7eda91dd704a6f43f80e98305d562387a03defd63374b393734b04348e3b4191aacafb3c182c963449b2616716fa89a2b58239da31c71297f1252f67e66a874cdee1fadfd2bfa17f25014fd0c786ac64f57489a72f10c6f9356c883f67a50dc2", 0xc6, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="867e005518e25fdc12932efd3accb33a2b73c4c751b87b417dd98fa4bc1fb512fd2320ca45fd44cc1a9239") r8 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="512f7d38620fc2a3c5ea0c334859a26d41f9f01bda9cd200e1965442925c70c477959a7646a4b094e5a1a36f0457e1c516c6beee4c9f570ef1396ca032ebe98d84f98ab6fdeff228455034b4b183a4620e28ce09d9b9b561e8a7889824811196dd3f0f49b433b00a857318173388d6d1f22fec75386cf6cfdfa48eac6e1c36bc39cd50", 0x83}, {&(0x7f0000000180)="fcc8b7a86a51e417fd4fc9633f7e8ce540233fcafe7301474cd75d24c0bb24adf9c3cfbc1b8a728d131ae40e2deb93d237299e68ef00c21014c1437b773a51d431612b855bb4a68d6c038d1dc34dceb8d489588d567fc76a6af16c3fba7578981c6e555f17c2eb9e7b417318b1ac7acb84add78492889f05ec01d3aefe0131377b0aa1b82e7e53aa6c59ffef66ad7b6843be6293c643a195795a80f73d17e316c6067abdba24d8aeefb4bf963eb6cfbcaf6ae5aa021ff7881035ca42952b5d6ab05f4763d4cd50510e6d2bbf2274edcee8e841db06153aadf359a09caecd52dcec65b415f557c6276010a5bdf1ddb805", 0xf0}], 0x3, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r4, r0, r5, r6, r0, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00}}}], 0xb0, 0x804}, 0x8000) 12:23:17 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:17 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:17 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:17 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:17 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:18 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:18 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:18 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:18 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:18 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x23, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="d9b0"], 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000400)=ANY=[], 0xda00) openat$cgroup_pressure(r2, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000300)={0x3, 0x80, 0xff, 0x7, 0x80, 0x0, 0x0, 0x64, 0x22000, 0xb16cf44bdb515e3b, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x38}, 0x8600, 0x401, 0x0, 0x6, 0x6, 0x9, 0x69, 0x0, 0xc0, 0x0, 0x2}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_pressure(r4, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_pressure(r5, &(0x7f0000000080)={'some', 0x20, 0x2000000005, 0x20, 0x10000000fffff}, 0x2f) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={0x1}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 12:23:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80086603, &(0x7f0000000040)) 12:23:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:19 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f00000002c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000540)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xa8bd000000000000, 0x23000) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x4}, 0x48) perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x2, 0x20, 0x99, 0x9, 0x0, 0x1, 0x4000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000240), 0x1}, 0x1, 0xfffffffffffffff8, 0x9, 0x1, 0xfffffffffffff87f, 0x2, 0x0, 0x0, 0x1, 0x0, 0x3ff}, r0, 0xc, r3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r1, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x6, 0xff, 0x1f, 0x27c, r6, 0x3, '\x00', r7, r0, 0x2, 0x0, 0x2, 0xe}, 0x48) 12:23:19 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:19 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:21 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000640)=[{0x0}, {0x0}, {&(0x7f0000000540)="e8", 0x1}], 0x3}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x7, 0x8, 0x5, 0x40, 0x4b, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pI4 \x00'}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)=@o_path={&(0x7f0000000400)='./file0\x00', 0x0, 0x0, r0}, 0x18) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r7 = syz_clone(0x40000000, &(0x7f0000000680)="5492a6bd44d991b90fa70b81728f351df14b68aacfccb66ed51d7c15f402cb096ad89ceebc50659ae4ba5eda98eb7514847a5d3aa567a94224be5ae3ddd0f34fde7080d9ca0ba1608ab06256d91654c0065c0ee73099abdbb5e79c2bd1b437b15911de166f4e7eda91dd704a6f43f80e98305d562387a03defd63374b393734b04348e3b4191aacafb3c182c963449b2616716fa89a2b58239da31c71297f1252f67e66a874cdee1fadfd2bfa17f25014fd0c786ac64f57489a72f10c6f9356c883f67a50dc2", 0xc6, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="867e005518e25fdc12932efd3accb33a2b73c4c751b87b417dd98fa4bc1fb512fd2320ca45fd44cc1a9239") r8 = gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="512f7d38620fc2a3c5ea0c334859a26d41f9f01bda9cd200e1965442925c70c477959a7646a4b094e5a1a36f0457e1c516c6beee4c9f570ef1396ca032ebe98d84f98ab6fdeff228455034b4b183a4620e28ce09d9b9b561e8a7889824811196dd3f0f49b433b00a857318173388d6d1f22fec75386cf6cfdfa48eac6e1c36bc39cd50", 0x83}, {&(0x7f0000000180)="fcc8b7a86a51e417fd4fc9633f7e8ce540233fcafe7301474cd75d24c0bb24adf9c3cfbc1b8a728d131ae40e2deb93d237299e68ef00c21014c1437b773a51d431612b855bb4a68d6c038d1dc34dceb8d489588d567fc76a6af16c3fba7578981c6e555f17c2eb9e7b417318b1ac7acb84add78492889f05ec01d3aefe0131377b0aa1b82e7e53aa6c59ffef66ad7b6843be6293c643a195795a80f73d17e316c6067abdba24d8aeefb4bf963eb6cfbcaf6ae5aa021ff7881035ca42952b5d6ab05f4763d4cd50510e6d2bbf2274edcee8e841db06153aadf359a09caecd52dcec65b415f557c6276010a5bdf1ddb805", 0xf0}], 0x3, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x20, 0x1, 0x1, [r2, r0, r3, r0]}}, @rights={{0x34, 0x1, 0x1, [r0, r4, r0, r5, r6, r0, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, 0xee00}}}], 0xb0, 0x804}, 0x8000) 12:23:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:26 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:26 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:26 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:27 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:32 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:34 executing program 0: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:34 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:35 executing program 4: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:39 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x738c04bf, 0x0, 0x0, 0x0, 0x0, 0x0) 12:23:39 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:39 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:40 executing program 3: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:40 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:40 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) [ 160.166194][ T4825] syz-executor.1 (4825) used greatest stack depth: 18768 bytes left 12:23:44 executing program 4: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:45 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:45 executing program 0: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:49 executing program 2: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:49 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:49 executing program 3: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:50 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:51 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:51 executing program 0: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:52 executing program 4: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:55 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:55 executing program 3: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:55 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:23:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:23:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:23:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:24:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:00 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:01 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getpid() recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) r3 = perf_event_open$cgroup(&(0x7f0000000d00)={0x4, 0x80, 0x5, 0x8, 0x0, 0x40, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000340), 0xb}, 0x8b240, 0x4, 0x1, 0x9, 0x8000000000000001, 0xff, 0xdb, 0x0, 0x1000, 0x0, 0x6}, r2, 0xc, r2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000d80)={0x5, 0x80, 0x0, 0x1, 0x0, 0x3, 0x0, 0x3, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xa8, 0x4, @perf_bp={&(0x7f0000000480), 0x2}, 0x400, 0x10000, 0x6, 0x6, 0x2, 0xae, 0x3, 0x0, 0x9, 0x0, 0x4}) write$cgroup_subtree(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa2cba2c"], 0xfdef) recvmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000c40)=""/165, 0xa5}], 0x1, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}, 0x2122) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000280)=@raw=[@generic={0x0, 0x8, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x9, 0x8001, 0x3}, @map_idx={0x18, 0x640bdd4790796e55, 0x5, 0x0, 0xe}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x6}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80), 0x8}, 0x90) write$cgroup_pid(r2, &(0x7f0000000300), 0x12) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000600)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000680)=""/221, 0xdd}, {&(0x7f0000000780)=""/226, 0xe2}, {&(0x7f0000000a00)=""/189, 0xbd}, {&(0x7f0000000ac0)=""/169, 0xa9}], 0x4, &(0x7f0000000bc0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0xda00) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000ffffffff0000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x10, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0xfffffffa, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x34100) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_freezer_state(r4, &(0x7f0000000140)='FREEZING\x00', 0x9) 12:24:02 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="01500000faec7df3714238ef575e472041a71b482254f452cd657cef071afed92a3832000000a6cb00f8ffffff0000000000000000ce23c9a6e3a0d62c8b38fd5dc0bb41e257d8e4271dc32169fcbb68b4e05d4ccd80775268680000000028601041dfaa9cffd5614def1f0d0749e347e90269aff4856864546229f8c8eee9378b9586754c620476590d7751273a368e0e3d066b6bdd1e715990483ef0d2ce5ba18b2e131f4c63f27d89791c9926b401000000000900001000000000ec4bbaece7b23e7b28e63f0f2f7d91937928f267f7689a936bab706df6dfe8973f6ff12ad759f936a5716e4229f2ab59484d50564c070a47f9c53350dcc0421f99de4d8f20bf87a2bcafd9b214ca10bc1067929b3ebd31df3071ab811ea433d2b198bfbd2bb191ec8b7950745d6864da24083ac95f1eeab1aae8d5de2adbe1c5c60435a07c86b056dc3a190fb7b072a95365df1b6c1a6354a44964645cde3b19a2247c069a044a1bde8f84b348da5c5f6d6b5018315b499d894874ce275832a6d307fdb5c20e9863020089aef7f3dd0d07cf4ca7a11cfb498fc8846e970efc8ee037f158ec94a31e6640020b9e144abf54fb52be339eddcc2e1bc9af64b515972759382896863c453c0bb3eb74e4bfb9d166d1c5a22409582b0673df693907e08f0c773977b440766d371a0c1209e172425269012f90689f0370dbc23739d6cca03af78b3e893a111f2eb82aa5a1452629a0d501f9be3b264e63a5e75372d9083ca8b17a151e5921c3b4ad1550adf7f83e1a8dfb1a5fa1bfc2a13cd499d57f0bb8f5f7d0fb4c1e55eda73ff2c0d8dfdffa53d4237b6b8c005625eab4744283ea985697849a975649b0870507d279ff7effff17a8008c92c80720990fc2a238cabb6d23787f3672aa70d083b3524cc73a41911ab89598a9452e318edc3544ac043522b1670807000c393d7c01a332b554fb0001adc7926c73511944826186895fd424902bd6dfa0c98b32007c74ddf40132b3a0ba1b04eab877ae19773787b04ef7d285ad2e0390c80178720d50d9684f1b43bdc88d6fbee600fdeb8eb13fabb7bb73817ea489a804e4baf06394a0ed055b0f7cda3988dbdff843d67afcc74a614615b69eebed61f4ec6d87609e9cea546a58290b2d038463c90e978bac12e9f704ab955bf4e60a38a18ba5f7fc247d40613cc8a8de6f24923112d45c3d0e71fb2e216004e0d5036b4d50917ede64fa74137b3e27064f9d55bf2c0392583b31855bb61fe13d83ddff2fc1a45fb8b8e36a5e50dd3c37849b180e6b7167603bdafb37cee3fb7fde53c62000d5f01e5f3e7f24715b80e800000000000000000000768a8494c7864a8c8a0bab631a554aa7175f360c24bd423924170eb43eeab7ab90bb09004230eb953f7ce98f93094b85579c81c2519a0928ec31bd645fca1c2ef2a89ee2a6c1258311997c8cf77da9a81836f37914bf5b7ba9c659849dabf6718a9d52a758b5ce61dde1d37dbdd3afd22550555addfe3372bfd62574e876b9dcf3c03b2a5f16d7e7fc22bd99da1fee32cf2b63ecebfc5f95993db76bf1ae85ae00094ea99b2bd84cb66cc0d91af9540b18055c0707ff57e5d4cb389b0e441289ce230ea97a31584c8b6437132b881258088e4667e7dbf69f73c2a257240bd6eff10549eeb8816e220000a6785e84701186c314456c51e775b55dfb599eb210817d194c985d6dcfd7a67dfb6515fcee3556eb77ae0c22abcf07da265f5cfa50fd4185324972c4fc1f3c27520245059ec22e5d014e2245d0a5e8dd04a62f76cf5661d8199c47501a6ab1d803bc6db4a3e35d3741a7e92e2c659093a2f71d4f0175cf4612b23d98d8e4d36b31d93e978dbba2db764d3b660ed2f799b5fea7054c9f0139ccd0947efba6a593712a6098dbd0bdb32e78047c0593d489ba307611d1037e0faed49b9fd1ddf8e1de706e248e2f8ddd0957aeb68d2bee3b8e0d9ac902321d3b4b643bfa05"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:24:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:02 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:02 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:02 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:03 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:05 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:24:05 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:05 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:05 executing program 1: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000480)={'veth1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_batadv\x00', 0x400}) r0 = getpid() r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x641a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1ff, 0x100}, 0xc00e, 0x0, 0x0, 0x1, 0x5, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x4, &(0x7f0000000300)='-\xf3x\xff'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x35d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x3, 0x5a, 0x38, 0x3, 0x0, 0x204, 0x2000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x2, @perf_bp={&(0x7f0000000380), 0x2}, 0x1004, 0xfd, 0x168, 0x6, 0x3, 0x210000, 0x40, 0x0, 0x10001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8f, &(0x7f00000009c0)='\x00`\xa7\x9e\xfep\xda\x9e5CK5\x8d\x85\xfb\x88\xec\\\x94\xe2\xa7\xc7C\xdc{[\xf6D\x89\x00m\x11\xa8\'\xaa\xd5\x0e?\n\xbaY\xa0\xf6\x9e\x8f\xcel\x97\xb2F\xeb\x83F\xd6\f\xdc\x8b\xdfd\x02\xec\xd8z\xb9\x9b\xd4\xd7|u\xeb\xd2\x9a\x10\x1ek\x1d;\xaao\xc9\xaa\xe6\x92\xcb|\xd4+\x00B\xe0\x86\xae\xe6\x88\x11\x99\x8b\xb8\x97m\x02\xec\x98\xec\xda\xd7\x17=j \xd1\x83\x00\x94\"\n\xf7\xdfY\x17\x96\x9aU\t\xa6\xd5\xaeP\xfc@\x9b\x1f\f\x8eE\xa20\x9c\x1a\x15Mc\xee'}, 0x30) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x6, 0x9, 0x3, 0x0, 0x4, 0x2404, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcd9, 0x4, @perf_config_ext={0x6f4, 0xff}, 0x202, 0x1, 0x3c5f, 0x4, 0x3, 0x4, 0x1, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x1000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) getpid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0xad, &(0x7f0000000780)=""/173, 0x40f00, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x10, 0xffffc126}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff]}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)=0x4) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xb) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x7, 0x1, 0x80, 0x0, 0x0, 0x1, 0x14000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x401, 0x3}, 0x800, 0x1, 0x5, 0x9, 0x1f, 0x40, 0x86b, 0x0, 0x400, 0x0, 0xb8}, 0xffffffffffffffff, 0x8, r1, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) r3 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x7a05, 0x1700) socketpair(0x33, 0x6, 0xe0000000, &(0x7f0000000100)) write$cgroup_int(r4, &(0x7f0000000200)=0xfffffffffffffffd, 0x12) write$cgroup_pid(r4, &(0x7f0000000280)=r3, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001840)={r0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f00000002c0)='b_service_bytes\x00'/27}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000500)='[\xab\xa8-:\\}{[).:^,\\{/\x00') write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000140), 0x12) 12:24:06 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x17, 0x0, 0xfffffffa, 0x8001, 0x340, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x5}, 0x48) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x9, 0x3, 0x1, 0x0, 0x0, 0x8a7f, 0x5097c0f94e97ac51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fffffff, 0x9}, 0x8000, 0x10001, 0xb1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) r2 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={0x0}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000780), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e80000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001640)={0x18, 0x0, 0x0, &(0x7f0000001440)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x24, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001580)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000015c0)={0x5, 0xc, 0x1000, 0xaf}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001600)=[{0x0, 0x1, 0xa, 0xb}], 0x10, 0x7}, 0x90) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xd, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffa}}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xc7, &(0x7f0000000a40)=""/199, 0x41100, 0x4d, '\x00', 0x0, 0x9, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x2, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=r1], &(0x7f00000000c0)='syzkaller\x00', 0xb04f, 0xe9, &(0x7f0000000280)=""/233, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0x4, &(0x7f0000000580)=@raw=[@map_fd={0x18, 0x2, 0x1, 0x0, r3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000600)=""/228, 0x40f00, 0x0, '\x00', 0x0, 0xc, r3, 0x8, &(0x7f0000000700)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x6, 0x10000, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[r3, r3, r3, 0x1]}, 0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xc0920400, 0x0, 0x1000000, 0x0, 0x0, 0x0) 12:24:07 executing program 0: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:07 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:07 executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:07 executing program 4: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:24:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x4, 0x17400}, 0x48) 12:24:08 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:08 executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ac0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0x3, 0x0, 0xa000000}, @union]}}, &(0x7f00000009c0)=""/243, 0x32, 0xf3, 0x1}, 0x20) 12:24:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:24:08 executing program 2: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000ddffffffffffffa9fe8000000000000027bfa7b09303960e2f80ae"], 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$ITER_CREATE(0x21, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) 12:24:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ac0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0x3, 0x0, 0xa000000}, @union]}}, &(0x7f00000009c0)=""/243, 0x32, 0xf3, 0x1}, 0x20) 12:24:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:24:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ac0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0x3, 0x0, 0xa000000}, @union]}}, &(0x7f00000009c0)=""/243, 0x32, 0xf3, 0x1}, 0x20) 12:24:09 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x4, 0x17400}, 0x48) 12:24:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000ac0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x0, 0x0, 0x3, 0x0, 0xa000000}, @union]}}, &(0x7f00000009c0)=""/243, 0x32, 0xf3, 0x1}, 0x20) [ 185.976887][ T3578] Bluetooth: hci1: command 0x0406 tx timeout [ 185.982993][ T3578] Bluetooth: hci5: command 0x0406 tx timeout [ 185.989728][ T48] Bluetooth: hci4: command 0x0406 tx timeout [ 185.989754][ T3576] Bluetooth: hci0: command 0x0406 tx timeout [ 185.995893][ T48] Bluetooth: hci2: command 0x0406 tx timeout [ 185.995926][ T48] Bluetooth: hci3: command 0x0406 tx timeout 12:24:09 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:10 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:10 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:10 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:11 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:11 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) [ 189.729705][ T5104] device syzkaller0 entered promiscuous mode 12:24:13 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:13 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:13 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x4, 0x17400}, 0x48) 12:24:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 190.547685][ T5124] device syzkaller0 entered promiscuous mode 12:24:14 executing program 5: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:14 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:14 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) [ 191.181677][ T5132] device syzkaller0 entered promiscuous mode 12:24:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xe9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x10, &(0x7f00000009c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0xd4, &(0x7f0000000780)=""/212, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000500)=[{0x5, 0x5, 0xd}, {0x1, 0x3, 0x8, 0x1}]}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 12:24:15 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x4, 0x4, 0x17400}, 0x48) 12:24:15 executing program 5: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:15 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) [ 191.784800][ T5138] device syzkaller0 entered promiscuous mode 12:24:15 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) [ 192.283908][ T5150] device syzkaller0 entered promiscuous mode 12:24:16 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) [ 192.506920][ T5149] device syzkaller0 entered promiscuous mode 12:24:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:16 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:16 executing program 5: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) [ 192.943192][ T5160] device syzkaller0 entered promiscuous mode 12:24:17 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc9}]}, &(0x7f00000002c0)='GPL\x00'}, 0x90) 12:24:17 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc9}]}, &(0x7f00000002c0)='GPL\x00'}, 0x90) [ 193.497155][ T5170] device syzkaller0 entered promiscuous mode 12:24:17 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc9}]}, &(0x7f00000002c0)='GPL\x00'}, 0x90) 12:24:17 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc9}]}, &(0x7f00000002c0)='GPL\x00'}, 0x90) [ 193.618164][ T5175] device syzkaller0 entered promiscuous mode 12:24:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 193.728184][ T5178] device syzkaller0 entered promiscuous mode 12:24:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:24:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:24:17 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 194.142449][ T1255] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.148833][ T1255] ieee802154 phy1 wpan1: encryption failed: -22 12:24:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xad, 0x75}, [@call={0x36}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) [ 194.248943][ T5204] device syzkaller0 entered promiscuous mode 12:24:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xad, 0x75}, [@call={0x36}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 12:24:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xad, 0x75}, [@call={0x36}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 12:24:18 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff8, 0x0, 0x5000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0361f6048b9fa9b3dc2366"], 0xd) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="da01"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(r3, &(0x7f0000000280)='syz0\x00', 0x1ff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup=r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{0x1}, &(0x7f0000000680), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x19, '\x00', 0x0, r0, 0x0, 0x3, 0x5}, 0x48) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, r5, 0x2e, 0x0, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x4, 0xf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r4, r5]}, 0x90) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x8204) 12:24:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) [ 194.630375][ T5202] device syzkaller0 entered promiscuous mode 12:24:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xad, 0x75}, [@call={0x36}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) 12:24:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000702000000feff007a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010402000000000000b7030000010000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb4500639100f51f00000000000000ff7f0000002f17cee19d0001000000000000000000cb04fcbb0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc2695ed094bd09b52680910d7d313f9f57606b83b994fb484510bef2e4872f5c2fe6faaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aad16d875fe369258673b5df11cc2afb53611cc320000bc0b80e80efc8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aaffe400000000000000000000008b798b4f5458d1863cc67c4c6a06e828e50500000019db1af1b5d356d0f072137d866d11be4ba3f0151f07bd4e97d62ecc645e143a60f1c6edc76609077909826151e2b42bf0ed0c7e8b0db51662de6d87c493db845b10e9468bda6f82881eb8c9cfa72b08eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d0616a48c7957e1226c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf1010000805f6ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d65b99909950000006b4207e6078625cb2717e21f8f187b1866108b6e8c71e26032176066599783568628f0309c3afa716d3706e1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6d2676bef8310f7032775cfd75652f87b039d543000000000000000008ce31344b554aca78a00000000000000e63a0dba7f6b25e8d5e40a3ae01a5dfde3b4dca2d38a9c0ea7b5bcd49f977c609915c7601080d10b96af1eb55922765313a0eeefae505f4535cd9dc69fbab92150c7e74e5c5b051ddf6399b0d00eee5c3afee38cdc55b8d3fbbe210bdec686a23503f4a547327caf381171cc9002be6d89f5734a9e204dbc327ec8f9851d273fa07369c419942509198605ff2781f4d2d4685d762d4764f7ff762e09116946137b7ab812a2d408ae4c53b3dcd3ab82f187bf77779d035818e562bf2737acf0412b217aa0d530438c101979312cbdb013c2f26afc263e000000000000000000001bd2340cdbd83ca18656299c6a99e68ca3c9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) [ 194.902894][ T5220] device syzkaller0 entered promiscuous mode 12:24:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000702000000feff007a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010402000000000000b7030000010000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb4500639100f51f00000000000000ff7f0000002f17cee19d0001000000000000000000cb04fcbb0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc2695ed094bd09b52680910d7d313f9f57606b83b994fb484510bef2e4872f5c2fe6faaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aad16d875fe369258673b5df11cc2afb53611cc320000bc0b80e80efc8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aaffe400000000000000000000008b798b4f5458d1863cc67c4c6a06e828e50500000019db1af1b5d356d0f072137d866d11be4ba3f0151f07bd4e97d62ecc645e143a60f1c6edc76609077909826151e2b42bf0ed0c7e8b0db51662de6d87c493db845b10e9468bda6f82881eb8c9cfa72b08eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d0616a48c7957e1226c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf1010000805f6ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d65b99909950000006b4207e6078625cb2717e21f8f187b1866108b6e8c71e26032176066599783568628f0309c3afa716d3706e1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6d2676bef8310f7032775cfd75652f87b039d543000000000000000008ce31344b554aca78a00000000000000e63a0dba7f6b25e8d5e40a3ae01a5dfde3b4dca2d38a9c0ea7b5bcd49f977c609915c7601080d10b96af1eb55922765313a0eeefae505f4535cd9dc69fbab92150c7e74e5c5b051ddf6399b0d00eee5c3afee38cdc55b8d3fbbe210bdec686a23503f4a547327caf381171cc9002be6d89f5734a9e204dbc327ec8f9851d273fa07369c419942509198605ff2781f4d2d4685d762d4764f7ff762e09116946137b7ab812a2d408ae4c53b3dcd3ab82f187bf77779d035818e562bf2737acf0412b217aa0d530438c101979312cbdb013c2f26afc263e000000000000000000001bd2340cdbd83ca18656299c6a99e68ca3c9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000702000000feff007a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010402000000000000b7030000010000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb4500639100f51f00000000000000ff7f0000002f17cee19d0001000000000000000000cb04fcbb0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc2695ed094bd09b52680910d7d313f9f57606b83b994fb484510bef2e4872f5c2fe6faaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aad16d875fe369258673b5df11cc2afb53611cc320000bc0b80e80efc8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aaffe400000000000000000000008b798b4f5458d1863cc67c4c6a06e828e50500000019db1af1b5d356d0f072137d866d11be4ba3f0151f07bd4e97d62ecc645e143a60f1c6edc76609077909826151e2b42bf0ed0c7e8b0db51662de6d87c493db845b10e9468bda6f82881eb8c9cfa72b08eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d0616a48c7957e1226c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf1010000805f6ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d65b99909950000006b4207e6078625cb2717e21f8f187b1866108b6e8c71e26032176066599783568628f0309c3afa716d3706e1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6d2676bef8310f7032775cfd75652f87b039d543000000000000000008ce31344b554aca78a00000000000000e63a0dba7f6b25e8d5e40a3ae01a5dfde3b4dca2d38a9c0ea7b5bcd49f977c609915c7601080d10b96af1eb55922765313a0eeefae505f4535cd9dc69fbab92150c7e74e5c5b051ddf6399b0d00eee5c3afee38cdc55b8d3fbbe210bdec686a23503f4a547327caf381171cc9002be6d89f5734a9e204dbc327ec8f9851d273fa07369c419942509198605ff2781f4d2d4685d762d4764f7ff762e09116946137b7ab812a2d408ae4c53b3dcd3ab82f187bf77779d035818e562bf2737acf0412b217aa0d530438c101979312cbdb013c2f26afc263e000000000000000000001bd2340cdbd83ca18656299c6a99e68ca3c9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:20 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) 12:24:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020030000b02d25a806f8c6394f90524fc602f1a09000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 196.858269][ T5243] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 196.869001][ T5243] netlink: 128124 bytes leftover after parsing attributes in process `syz-executor.5'. 12:24:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) 12:24:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000702000000feff007a0af0ff0000000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010001010402000000000000b7030000010000006a0a00fe000000008500000032000000b700000001000000950000000000000075cdc4b57b0c65752a3ad50000007ddd0000cb4500639100f51f00000000000000ff7f0000002f17cee19d0001000000000000000000cb04fcbb0b9bafe3ba431351a58a885ba9918d37b056b9bbd11b6b9f6cf7db6d574620260000000000008062d77e84cef4a2ab938f65aac33c4d620de2c9b7dc2695ed094bd09b52680910d7d313f9f57606b83b994fb484510bef2e4872f5c2fe6faaf75e5cc4051ade12f41deff6df6a936b4ec3827c739bb39aad16d875fe369258673b5df11cc2afb53611cc320000bc0b80e80efc8f5e64be2c9d2d29db3d36dd015c7bd3f15aa6aadbeab2a01685108e61aaffe400000000000000000000008b798b4f5458d1863cc67c4c6a06e828e50500000019db1af1b5d356d0f072137d866d11be4ba3f0151f07bd4e97d62ecc645e143a60f1c6edc76609077909826151e2b42bf0ed0c7e8b0db51662de6d87c493db845b10e9468bda6f82881eb8c9cfa72b08eecc952a3fd2c46f3c1cde71a19d1a2982492a210e00d2bfea3b8d188df2eff8d56aaae7d32a2e183722537395019f02ec4b85f6aad7faca088de9b26797a8446b16c28d85f225992dbdd5bb01ba51508951c7a7d6ca0916c3a12912715649c2b1c7192a4251b59d378d0616a48c7957e1226c9129a7c5f8ee5f50579e2f638f7eb12f63be72a3d817b324d6e417b1c2cbfdcada0a16e31790e26cf1010000805f6ee2782224cf30f810da86cf1a3204f4c9404f5d7321a4fefc4d65b99909950000006b4207e6078625cb2717e21f8f187b1866108b6e8c71e26032176066599783568628f0309c3afa716d3706e1fa89917e131f4034a8383e99c3568fd04201b37cd92ca6d2676bef8310f7032775cfd75652f87b039d543000000000000000008ce31344b554aca78a00000000000000e63a0dba7f6b25e8d5e40a3ae01a5dfde3b4dca2d38a9c0ea7b5bcd49f977c609915c7601080d10b96af1eb55922765313a0eeefae505f4535cd9dc69fbab92150c7e74e5c5b051ddf6399b0d00eee5c3afee38cdc55b8d3fbbe210bdec686a23503f4a547327caf381171cc9002be6d89f5734a9e204dbc327ec8f9851d273fa07369c419942509198605ff2781f4d2d4685d762d4764f7ff762e09116946137b7ab812a2d408ae4c53b3dcd3ab82f187bf77779d035818e562bf2737acf0412b217aa0d530438c101979312cbdb013c2f26afc263e000000000000000000001bd2340cdbd83ca18656299c6a99e68ca3c9"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020030000b02d25a806f8c6394f90524fc602f1a09000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 12:24:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 12:24:20 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 197.063163][ T5254] netlink: 'syz-executor.5': attribute type 9 has an invalid length. 12:24:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001140)=@o_path={&(0x7f0000001040)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001200)={0x18, 0xa, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_fd={0x18, 0x1}, @alu={0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, @exit, @map_fd={0x18, 0xb}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0), 0x8, 0x10, &(0x7f00000006c0)={0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001180)=[r2], &(0x7f00000011c0)=[{}, {0x0, 0x2, 0x2, 0x3}], 0x10, 0x800}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa69}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3}, @jmp={0x5, 0x1, 0x7, 0x9, 0x3, 0x30, 0xfffffffffffffff0}, @map_val={0x18, 0x6, 0x2, 0x0, r3}, @ldst={0x1, 0x0, 0x1, 0x9, 0x7, 0x10, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x1, 0x4}]}, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x2, 0x2, 0x0, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000980)={r4, r3}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x2b, 0x5, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, [@generic={0x1, 0x5, 0x9, 0x3, 0x100}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000e00)='syzkaller\x00', 0x54, 0xa4, &(0x7f0000000e40)=""/164, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff], 0x0, 0x10, 0x100000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x10, 0x11, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0x1, 0x5, 0x6, 0x2, 0x20}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000480)=""/218, 0x41100, 0x1, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x3, 0x101}, 0x10, 0x0, r3, 0x2, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000009c0)=[{0x4, 0x2, 0x6, 0x9}, {0x0, 0x5, 0x9}], 0x10, 0x5}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x5460, 0x20000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x9, &(0x7f0000000400)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x40}, @map_val={0x18, 0xb}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfa}, @generic={0x0, 0x9, 0xc, 0x401, 0x823}]}, 0x0, 0x200, 0x0, 0x0, 0x0, 0x27, '\x00', r5, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x6, 0x8001}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x5, 0x6, 0x7f, 0x7, 0x0, 0xa14, 0x280c0, 0xf, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0x7ff}, 0x80000, 0x1, 0x3e2e, 0x6, 0x2, 0x6, 0x200, 0x0, 0x7, 0x0, 0x7f}, 0xffffffffffffffff, 0xc, r6, 0x1b) perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x9, 0x6, 0x3f, 0x6, 0x0, 0x3ff, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x400}, 0x10004, 0x51, 0x6, 0x9, 0x3, 0x1, 0x0, 0x0, 0x100, 0x0, 0x7679}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xa, &(0x7f0000000580)=@framed={{}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xc}, @tail_call]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x1f2f, 0x241, 0x38f, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) [ 197.166147][ T5254] netlink: 128124 bytes leftover after parsing attributes in process `syz-executor.5'. 12:24:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020030000b02d25a806f8c6394f90524fc602f1a09000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 12:24:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:24:21 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:24:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 197.430450][ T5265] netlink: 'syz-executor.5': attribute type 9 has an invalid length. [ 197.498178][ T5265] netlink: 128124 bytes leftover after parsing attributes in process `syz-executor.5'. 12:24:21 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:24:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:24:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:24:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020030000b02d25a806f8c6394f90524fc602f1a09000a740100053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 12:24:21 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:24:21 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 197.791391][ T5278] netlink: 'syz-executor.5': attribute type 9 has an invalid length. 12:24:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000ae685c0b163ef93d82c7e307963117b5a705fd4a74bc49e24a9ae8c22842f85899c62ca3a6ff691f1df44c614a5fd33f6f8a4eb689d0910000000096d3635567c2d514698af29411dd54da063469b0e756f055d162dfd2311a63be96f52406aff201b1057a8fc25a4e33b1a296875642eb3a7b7b2cda1ba46a2a42c4c333abc80e0000000000004e4c4263efd12b257fdf9d292ba48e3aa93faeb7a3973a6dd9cf527332eb4a5dda77ad0e925d0a9c004dcb78410a3100c44cb61c92d40e31577a4e64c1155008241709504b573381f79b890a2aedbe60114760df9a"], &(0x7f0000000040)='syzkaller\x00'}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='initcall_start\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, r1, 0x0, 0x1, &(0x7f00000001c0)='\x00'}, 0x11) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 197.885229][ T5278] netlink: 128124 bytes leftover after parsing attributes in process `syz-executor.5'. 12:24:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="2af7fc967431fe442c67851ef05bdff817ee9f4f92df16a311472d59c6a09082f27fec2c0344237dff82703a08f1a6799d5d2ea90bc1c6b05ba463d73ffd5222dc4f76b1dbf54565c0051c45f667b989ba12d9d4a96e17d14ffb55447cb656835d89bcab71e54ba15d2de84c131560840317db765b453f86990303f1fbcebcdd03707f4ad1b407c70f109e5359ef5338320d5fc10ed8fa49518c31d075f6af002b9a7a950bde16a06e4a2855dc2482d6ab749c415cd7d8af429769544f03ab7aac5ecd5cb89ae91f38a13d3b02f526ec93f99b26fc7549a566914e7b1dc14d9c4a32a730163c978d8a025d1f57f74e3347e470b12a4e2647fc01b279"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x68}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) 12:24:21 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x68}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) 12:24:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x68}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) 12:24:22 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:22 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x68}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) 12:24:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="2af7fc967431fe442c67851ef05bdff817ee9f4f92df16a311472d59c6a09082f27fec2c0344237dff82703a08f1a6799d5d2ea90bc1c6b05ba463d73ffd5222dc4f76b1dbf54565c0051c45f667b989ba12d9d4a96e17d14ffb55447cb656835d89bcab71e54ba15d2de84c131560840317db765b453f86990303f1fbcebcdd03707f4ad1b407c70f109e5359ef5338320d5fc10ed8fa49518c31d075f6af002b9a7a950bde16a06e4a2855dc2482d6ab749c415cd7d8af429769544f03ab7aac5ecd5cb89ae91f38a13d3b02f526ec93f99b26fc7549a566914e7b1dc14d9c4a32a730163c978d8a025d1f57f74e3347e470b12a4e2647fc01b279"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d2943e6f5f828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:24 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="850000f09d02db26701ef1a52f50813b16b35c0008000000350000000000000085000000050000009500000000000000fed023000000c71adb30be7d75fa1f32f08a23ce3220b0cc9505d72768b8242dd90d17e4c52505756ca2b009546a0900000000000000d3df2bd87184446d165ae3939bbca322a415a98c8801000000000000800859362ed862b3c47fa8ce7c69adfd2f16af3a00000000000000000000009a317aa34f0c50f99eedac26048ab915e1be5aa845be00de14683ee4e859d65564a9c79d20e5a011e966388cd0bb39f45d6c508b8a0f7f2d48be0e2a8137c6741775428abf2ddfd2a473f5b271701e22f8cb42198906e1107fa780c435083cac323838727a606495803509f84729f3e8a2fbfb995f99b82df3b363a9cf6ba87fdfbfc63dd0dde49b4193520e5e946687634c040000e4000000bfbcd911eba0dee5e5ce6434f86fe82ee02f0e8e3173a97d85e232e584ace13387693614f3a7ef88709f4d552c7b3a7903e14dc418e58f3e98933b2c93fae25ec2dd190231e2531e1ffeff33676a4383a918cba3ad8318ea29f164563a42cdb596f255a251add2d2ae2fac0a0e7428e4bf07fc884be5721bdffe58c6a4b57014ce976ce8b9cddfa50175c53253d7659f0e885f6c677c24b226ab337fada4363c0698510730725e23bdad60ceaeecfeeccc397565f204b82d6d4458d77a1b4abeadf350c21027d314237a9d448b82827ff3f29cc9b46c8fcfbb30d1fc18707c252b596cdbf4e77836adc1f59f9d1280333d135fdcdcee8eb817388666e02ff1b148b6bc3c283e71c00e9c683c6bb6fea2d2d54af3ad488f0cc2e54a70c19ceac518adbe917652c34019d7478c716ab23d4a293b4dcd08d89f6cec674e9fd379d71e06357d207984e885ace8a0dbd5affef403aff01d5f2f0e644b61cd8bd72a59f2d7cf67815aeb8761412d68c40dbed08b7eeda96b3856a519a71b83c19b2e8f88d92b66abec165663819a87e7cd8c082cb011051789c283eecfe08f0799f6c7025984bcd7072d00ef576c683f3353b6d3af7177d6b56549616bfede82c598301c98b0420b1784b53238b39c0db1da864e593d45fd297e4d34e76bd649bc737e0bcf36fd955a40125c00d40c3f21d26e6e276152412b4ef3f52dc416bb2d7463a93ee6c0b20c5749a44677a3c3a7aa9a47c7cd7bb52fbb2c8d63166f4ad1038f33258736b2224a66726f1fd4dce0eb6043a55fbdd341baba95cc5838a860068e0f3e73d992403455b03b25bd5414628d7325a6b25986666b336851d9c623c405bf608d4bd9347c83cb693aebab072be479705b0c6c9bb9728d131f8320b966898de1a16407692b57b6b6d77b2ffea2fdb1f7333eac0d2ed0a7a4457d9c70089fe700a553929a65777f3bbf6d0bdc6a11371a138c6d4b0fefc655716e4486f5c7a88e80b2fb0efb579333bef98ded75abfb982b1fb92f003a6aefb8bf25eacb848d8ed1c1164e7599f61f604c4ed331c2a7fad08637b50c3fbc6bbb6c98b7a0"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) 12:24:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:24 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:24 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rcu_utilization\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000840)={0x5, 0x80, 0x1a, 0xaf, 0x0, 0x1, 0x0, 0x9, 0x210, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000800), 0x8}, 0x2000, 0x9a40, 0x80000000, 0x6, 0x0, 0x40, 0x9, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x401}, 0x2802, 0x0, 0x4, 0x0, 0x0, 0xffffa0fd}, 0x0, 0x545, 0xffffffffffffffff, 0x0) getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x3f) perf_event_open(&(0x7f0000000400)={0x7, 0x80, 0x5, 0x0, 0x41, 0x80, 0x0, 0xd, 0x73071914393b6e53, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x0, 0x5}, 0x1c404, 0xc9, 0x5, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8001, 0x0, 0x27}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x898, 0x1007}, 0x0, 0x5f85, 0x0, 0x2, 0x0, 0x3ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, r2, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xd, 0x1b, &(0x7f0000000900)=ANY=[@ANYBLOB="9500000000000000b7080000000000007b8af8ff00000000b7080000980200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180101002020782500000000002020207b1af87c6929e3bf5e311595510cd4b42d57ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000"], &(0x7f0000000100)='syzkaller\x00', 0x3, 0x5a, &(0x7f0000000640)=""/90, 0x0, 0x21, '\x00', 0x0, 0x20, r2, 0x8, &(0x7f00000003c0)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xa, 0x0, 0x2}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r2, r2], &(0x7f0000000700)=[{0x0, 0x1, 0x9, 0x5}], 0x10, 0x2}, 0x90) 12:24:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:25 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="2af7fc967431fe442c67851ef05bdff817ee9f4f92df16a311472d59c6a09082f27fec2c0344237dff82703a08f1a6799d5d2ea90bc1c6b05ba463d73ffd5222dc4f76b1dbf54565c0051c45f667b989ba12d9d4a96e17d14ffb55447cb656835d89bcab71e54ba15d2de84c131560840317db765b453f86990303f1fbcebcdd03707f4ad1b407c70f109e5359ef5338320d5fc10ed8fa49518c31d075f6af002b9a7a950bde16a06e4a2855dc2482d6ab749c415cd7d8af429769544f03ab7aac5ecd5cb89ae91f38a13d3b02f526ec93f99b26fc7549a566914e7b1dc14d9c4a32a730163c978d8a025d1f57f74e3347e470b12a4e2647fc01b279"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="2af7fc967431fe442c67851ef05bdff817ee9f4f92df16a311472d59c6a09082f27fec2c0344237dff82703a08f1a6799d5d2ea90bc1c6b05ba463d73ffd5222dc4f76b1dbf54565c0051c45f667b989ba12d9d4a96e17d14ffb55447cb656835d89bcab71e54ba15d2de84c131560840317db765b453f86990303f1fbcebcdd03707f4ad1b407c70f109e5359ef5338320d5fc10ed8fa49518c31d075f6af002b9a7a950bde16a06e4a2855dc2482d6ab749c415cd7d8af429769544f03ab7aac5ecd5cb89ae91f38a13d3b02f526ec93f99b26fc7549a566914e7b1dc14d9c4a32a730163c978d8a025d1f57f74e3347e470b12a4e2647fc01b279"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:27 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:28 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="2af7fc967431fe442c67851ef05bdff817ee9f4f92df16a311472d59c6a09082f27fec2c0344237dff82703a08f1a6799d5d2ea90bc1c6b05ba463d73ffd5222dc4f76b1dbf54565c0051c45f667b989ba12d9d4a96e17d14ffb55447cb656835d89bcab71e54ba15d2de84c131560840317db765b453f86990303f1fbcebcdd03707f4ad1b407c70f109e5359ef5338320d5fc10ed8fa49518c31d075f6af002b9a7a950bde16a06e4a2855dc2482d6ab749c415cd7d8af429769544f03ab7aac5ecd5cb89ae91f38a13d3b02f526ec93f99b26fc7549a566914e7b1dc14d9c4a32a730163c978d8a025d1f57f74e3347e470b12a4e2647fc01b279"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:28 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r2, 0x80000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x3f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80084, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xf3f, 0x1, @perf_config_ext, 0x0, 0x871, 0x2, 0x8, 0x5, 0x6, 0xfefc, 0x0, 0x20, 0x0, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x142) write$cgroup_subtree(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb7907a56675f37538ec86dd6317ce22667f2c00db5b686158bbcfe8875a65969ff57b00000000000000000020000000ac1414aa2cba2c"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x32, 0xfffffffffffffcc1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000280)=@raw=[@generic={0x2, 0x0, 0x1, 0x1ff, 0xfffffff8}, @generic={0xff, 0x8, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x640bdd4790796e55}], &(0x7f0000000880)='GPL\x00', 0x1f, 0x0, 0x0, 0x0, 0x2, '\x00', r4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x2, &(0x7f0000000680)=ANY=[@ANYBLOB="2af7fc967431fe442c67851ef05bdff817ee9f4f92df16a311472d59c6a09082f27fec2c0344237dff82703a08f1a6799d5d2ea90bc1c6b05ba463d73ffd5222dc4f76b1dbf54565c0051c45f667b989ba12d9d4a96e17d14ffb55447cb656835d89bcab71e54ba15d2de84c131560840317db765b453f86990303f1fbcebcdd03707f4ad1b407c70f109e5359ef5338320d5fc10ed8fa49518c31d075f6af002b9a7a950bde16a06e4a2855dc2482d6ab749c415cd7d8af429769544f03ab7aac5ecd5cb89ae91f38a13d3b02f526ec93f99b26fc7549a566914e7b1dc14d9c4a32a730163c978d8a025d1f57f74e3347e470b12a4e2647fc01b279"], &(0x7f00000001c0)='GPL\x00', 0x7fffffff, 0xb2, &(0x7f00000004c0)=""/178, 0x40f00, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x1, 0x0, 0x8}, 0x10, 0xffffffffffffffff}, 0x90) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[], 0x34100) syz_clone(0x1000080, &(0x7f0000000600)="c6523d67360b225fc12c711aa276e5f610e7dfd23d3fbe5125be16cfb8d511426cc1ea797480d65cb3cf888868d876ac9f75cfb1ccfc8b615a62c55053376094c82f9976de4b822a4e98bb7fbb8bfbfcab02717069c4d6219b87b5a379a9c8", 0x5f, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000480)="e1492bcc2f66") 12:24:29 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:29 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:29 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:31 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:31 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00'}) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000000), 0x8) 12:24:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:31 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00'}) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000000), 0x8) 12:24:31 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000633277fbac141416ac14141607089f034d2f87e5890c6aab845013f2325f1a39018602038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 12:24:31 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000000)='ext4_fc_commit_start\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0x9) gettid() perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xffffffff, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_clone(0x80030600, &(0x7f00000003c0), 0x0, &(0x7f0000000400), &(0x7f0000000a00), &(0x7f0000000a40)="04b35d") syz_open_procfs$namespace(r2, &(0x7f0000000a80)='ns/time_for_children\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='freezer.self_freezing\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x4, 0x4, 0x4, 0x2, 0x800}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x34000) 12:24:31 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00'}) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000000), 0x8) 12:24:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:31 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'dvmrp0\x00'}) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000000), 0x8) 12:24:31 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:31 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:31 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:31 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r0, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001880)={{r2, 0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001940)={{r1}, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffe6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c40)={{r3}, &(0x7f0000000bc0), &(0x7f0000000c00)='%pB \x00'}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000780)={0x2, 0x80, 0x0, 0x25, 0x20, 0x1, 0x0, 0x6, 0x10018, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x7}, 0x4041, 0x2, 0x48, 0x5, 0x5, 0x0, 0x0, 0x0, 0x2a7, 0x0, 0x6}, r5, 0x5, r5, 0x5) openat$cgroup_ro(r5, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0xfffffffffffffe04) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b40)={@cgroup=r6, 0x33, 0x1, 0x8001, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b80)={@ifindex, r7, 0x0, 0x28, 0x0, @link_id, r8}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@ifindex, r4, 0x36, 0x2002, r4, @link_fd=r5, r8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r10, 0x2f08, 0x10, 0x10, &(0x7f00000006c0)="0000000000000005", &(0x7f0000000700)=""/8, 0x447, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 12:24:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000002"], &(0x7f00000000c0)=""/189, 0x1a, 0xbd, 0x1}, 0x20) 12:24:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x1c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 12:24:32 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:32 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:32 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000007b000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_request_blocks\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) 12:24:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000002"], &(0x7f00000000c0)=""/189, 0x1a, 0xbd, 0x1}, 0x20) 12:24:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfe33) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'xfrm0\x00', @broadcast}) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = syz_clone(0x8080, &(0x7f0000000cc0), 0x0, 0x0, &(0x7f0000000e00), 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x6, 0x0, 0x5d, 0x0, 0x0, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3f, 0x4, @perf_config_ext={0x0, 0x4}, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3f}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) close(r3) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) 12:24:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x1c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 12:24:32 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000004000)={&(0x7f00000005c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000000000)=[{&(0x7f0000002b80)='O', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001600)="03", 0x1}], 0x1}, 0x0) 12:24:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000002"], &(0x7f00000000c0)=""/189, 0x1a, 0xbd, 0x1}, 0x20) 12:24:32 executing program 0: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x1c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 12:24:32 executing program 4: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r0, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001880)={{r2, 0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001940)={{r1}, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffe6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c40)={{r3}, &(0x7f0000000bc0), &(0x7f0000000c00)='%pB \x00'}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000780)={0x2, 0x80, 0x0, 0x25, 0x20, 0x1, 0x0, 0x6, 0x10018, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x7}, 0x4041, 0x2, 0x48, 0x5, 0x5, 0x0, 0x0, 0x0, 0x2a7, 0x0, 0x6}, r5, 0x5, r5, 0x5) openat$cgroup_ro(r5, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0xfffffffffffffe04) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b40)={@cgroup=r6, 0x33, 0x1, 0x8001, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b80)={@ifindex, r7, 0x0, 0x28, 0x0, @link_id, r8}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@ifindex, r4, 0x36, 0x2002, r4, @link_fd=r5, r8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r10, 0x2f08, 0x10, 0x10, &(0x7f00000006c0)="0000000000000005", &(0x7f0000000700)=""/8, 0x447, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 12:24:32 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x13, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x1c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) 12:24:32 executing program 2: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r0, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001880)={{r2, 0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)='%-010d \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001940)={{r1}, 0x0, 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffe6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000c40)={{r3}, &(0x7f0000000bc0), &(0x7f0000000c00)='%pB \x00'}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000780)={0x2, 0x80, 0x0, 0x25, 0x20, 0x1, 0x0, 0x6, 0x10018, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x7}, 0x4041, 0x2, 0x48, 0x5, 0x5, 0x0, 0x0, 0x0, 0x2a7, 0x0, 0x6}, r5, 0x5, r5, 0x5) openat$cgroup_ro(r5, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0xfffffffffffffe04) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000b40)={@cgroup=r6, 0x33, 0x1, 0x8001, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000780)=[0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b80)={@ifindex, r7, 0x0, 0x28, 0x0, @link_id, r8}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@ifindex, r4, 0x36, 0x2002, r4, @link_fd=r5, r8}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={0x0, 0x9, 0x8}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r10, 0x2f08, 0x10, 0x10, &(0x7f00000006c0)="0000000000000005", &(0x7f0000000700)=""/8, 0x447, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 12:24:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100180000000000000002"], &(0x7f00000000c0)=""/189, 0x1a, 0xbd, 0x1}, 0x20) 12:24:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0xfe33) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'xfrm0\x00', @broadcast}) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = syz_clone(0x8080, &(0x7f0000000cc0), 0x0, 0x0, &(0x7f0000000e00), 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x6, 0x0, 0x5d, 0x0, 0x0, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3f, 0x4, @perf_config_ext={0x0, 0x4}, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3f}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='percpu_free_percpu\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0xffffffffffffffff) close(r3) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) [ 208.836489][ C1] softirq: huh, entered softirq 9 RCU ffffffff8173d320 with preempt_count 00000101, exited with 00000100? [ 208.848724][ T5504] BUG: sleeping function called from invalid context at net/bpf/test_run.c:81 [ 208.858153][ T5504] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5504, name: syz-executor.4 [ 208.867826][ T5504] preempt_count: 1, expected: 0 [ 208.873195][ T5504] RCU nest depth: 0, expected: 0 [ 208.878673][ T5504] no locks held by syz-executor.4/5504. [ 208.885196][ T5504] Preemption disabled at: [ 208.885255][ T5504] [] bpf_bprintf_prepare+0x114/0x1310 [ 208.897192][ T5504] CPU: 1 PID: 5504 Comm: syz-executor.4 Not tainted 6.1.71-syzkaller #0 [ 208.905561][ T5504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 208.915658][ T5504] Call Trace: [ 208.918977][ T5504] [ 208.921929][ T5504] dump_stack_lvl+0x1e3/0x2cb [ 208.926667][ T5504] ? nf_tcp_handle_invalid+0x642/0x642 [ 208.932162][ T5504] ? panic+0x75d/0x75d [ 208.936279][ T5504] ? bpf_bprintf_prepare+0x114/0x1310 [ 208.941710][ T5504] __might_resched+0x5cb/0x780 [ 208.946516][ T5504] ? bpf_bprintf_prepare+0x114/0x1310 [ 208.951943][ T5504] ? __might_sleep+0xb0/0xb0 [ 208.956570][ T5504] ? migrate_enable+0x1a2/0x290 [ 208.961459][ T5504] ? bpf_snprintf+0x1ed/0x210 [ 208.966193][ T5504] bpf_test_timer_continue+0x26f/0x350 [ 208.971683][ T5504] bpf_test_run+0x44b/0x8b0 [ 208.976228][ T5504] ? convert___skb_to_skb+0x610/0x610 [ 208.981617][ T5504] ? eth_type_trans+0x401/0x6c0 [ 208.986480][ T5504] ? eth_get_headlen+0x240/0x240 [ 208.991440][ T5504] ? convert___skb_to_skb+0x41/0x610 [ 208.996745][ T5504] ? build_skb+0x112/0x250 [ 209.001182][ T5504] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 209.006587][ T5504] ? cpu_online+0xb0/0xb0 [ 209.010934][ T5504] ? cpu_online+0xb0/0xb0 [ 209.015276][ T5504] bpf_prog_test_run+0x32f/0x3a0 [ 209.020259][ T5504] __sys_bpf+0x3eb/0x6c0 [ 209.024525][ T5504] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 209.029927][ T5504] ? print_irqtrace_events+0x210/0x210 [ 209.035398][ T5504] ? print_irqtrace_events+0x210/0x210 [ 209.040878][ T5504] ? syscall_enter_from_user_mode+0x2e/0x220 [ 209.046869][ T5504] ? lockdep_hardirqs_on+0x94/0x130 [ 209.052077][ T5504] __x64_sys_bpf+0x78/0x90 [ 209.056516][ T5504] do_syscall_64+0x3d/0xb0 [ 209.060956][ T5504] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 209.066874][ T5504] RIP: 0033:0x7f254667cd29 [ 209.071296][ T5504] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 209.090912][ T5504] RSP: 002b:00007f25473fd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.099333][ T5504] RAX: ffffffffffffffda RBX: 00007f25467abf80 RCX: 00007f254667cd29 [ 209.107318][ T5504] RDX: 000000000000004c RSI: 0000000020000640 RDI: 000000000000000a [ 209.115299][ T5504] RBP: 00007f25466c947a R08: 0000000000000000 R09: 0000000000000000 [ 209.123275][ T5504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 209.131255][ T5504] R13: 000000000000000b R14: 00007f25467abf80 R15: 00007fff28cec518 [ 209.139250][ T5504] [ 209.274100][ T5504] BUG: scheduling while atomic: syz-executor.4/5504/0x00000002 [ 209.282125][ T5504] no locks held by syz-executor.4/5504. [ 209.289232][ T5504] Modules linked in: [ 209.293574][ T5504] Preemption disabled at: [ 209.293777][ T5504] [] bpf_bprintf_prepare+0x114/0x1310 [ 209.305529][ T5504] Kernel panic - not syncing: scheduling while atomic: panic_on_warn set ... [ 209.314368][ T5504] CPU: 1 PID: 5504 Comm: syz-executor.4 Tainted: G W 6.1.71-syzkaller #0 [ 209.324212][ T5504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 209.334300][ T5504] Call Trace: [ 209.337609][ T5504] [ 209.340567][ T5504] dump_stack_lvl+0x1e3/0x2cb [ 209.345291][ T5504] ? nf_tcp_handle_invalid+0x642/0x642 [ 209.350799][ T5504] ? panic+0x75d/0x75d [ 209.354910][ T5504] ? vscnprintf+0x59/0x80 [ 209.359274][ T5504] panic+0x318/0x75d [ 209.363204][ T5504] ? check_panic_on_warn+0x1d/0xa0 [ 209.368346][ T5504] ? memcpy_page_flushcache+0xfc/0xfc [ 209.373749][ T5504] ? bpf_bprintf_prepare+0x114/0x1310 [ 209.379170][ T5504] ? __wake_up_klogd+0xcc/0x100 [ 209.384066][ T5504] ? kfree+0x30/0x190 [ 209.388095][ T5504] check_panic_on_warn+0x7e/0xa0 [ 209.393155][ T5504] ? bpf_bprintf_prepare+0x114/0x1310 [ 209.398580][ T5504] __schedule_bug+0x1ba/0x220 [ 209.403294][ T5504] ? raw_spin_rq_unlock_irq+0x80/0x80 [ 209.408727][ T5504] __schedule+0x14ed/0x4550 [ 209.413291][ T5504] ? bpf_prog_test_run+0x345/0x3a0 [ 209.418466][ T5504] ? __sys_bpf+0x3eb/0x6c0 [ 209.422926][ T5504] ? release_firmware_map_entry+0x185/0x185 [ 209.428864][ T5504] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 209.435157][ T5504] ? print_irqtrace_events+0x210/0x210 [ 209.440669][ T5504] ? print_irqtrace_events+0x210/0x210 [ 209.446184][ T5504] schedule+0xbf/0x180 [ 209.450309][ T5504] exit_to_user_mode_loop+0x44/0x100 [ 209.455645][ T5504] exit_to_user_mode_prepare+0xb1/0x140 [ 209.461245][ T5504] syscall_exit_to_user_mode+0x60/0x270 [ 209.466840][ T5504] do_syscall_64+0x49/0xb0 [ 209.471295][ T5504] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 209.477225][ T5504] RIP: 0033:0x7f254667cd29 [ 209.481679][ T5504] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 209.501325][ T5504] RSP: 002b:00007f25473fd0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.509785][ T5504] RAX: 0000000000000000 RBX: 00007f25467abf80 RCX: 00007f254667cd29 [ 209.517801][ T5504] RDX: 000000000000004c RSI: 0000000020000640 RDI: 000000000000000a [ 209.525897][ T5504] RBP: 00007f25466c947a R08: 0000000000000000 R09: 0000000000000000 [ 209.533889][ T5504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 209.541889][ T5504] R13: 000000000000000b R14: 00007f25467abf80 R15: 00007fff28cec518 [ 209.549909][ T5504] [ 209.553165][ T5504] Kernel Offset: disabled [ 209.557602][ T5504] Rebooting in 86400 seconds..