0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:24 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x18, 0x0, 0x7, "ae"}], 0x108, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x648}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:25 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x4b4}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:25 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x18, 0x0, 0x0, "ae"}], 0x108, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x487}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7f0}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:25 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x546}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:25 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x445}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:25 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x688}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7e1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:25 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x10}], 0x100, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x366}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:25 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x403}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:26 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x0, 0x0, "ae"}], 0xf0, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x246}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:26 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x83d}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:26 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x120}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xb9}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:26 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x10}], 0xe8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x685}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:26 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xf6}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:26 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x47a}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:26 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1b1}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:26 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1e2}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:26 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x35}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:27 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6a3}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x696}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:27 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x0) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1ac}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:27 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0x0, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x722}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:27 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x59a}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:27 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x489}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:27 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x8dd}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:27 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x504}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:27 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x460}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:27 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x553}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:28 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3ec}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:28 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3e0}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:28 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x183}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:28 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x61f}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:28 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x666}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x56d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:28 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x153}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:28 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7d5}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:28 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x763}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:28 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x210}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:28 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5f7}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:28 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7a2}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:29 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x526}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:29 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3f5}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x732}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:29 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x392}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:29 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x834}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:29 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x321}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:29 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xa1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x962}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:29 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:29 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:30 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x32c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:30 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:30 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2a}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3d9}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:30 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x31}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:30 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:30 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:30 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7f8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x51c}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x187}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:30 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x0, &(0x7f0000000780)) 23:26:30 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:30 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6c6}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:30 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x0, &(0x7f0000000780)) 23:26:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3de}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x72c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:31 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x31}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6e8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x36f}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:31 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x0, &(0x7f0000000780)) 23:26:31 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xe8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x559}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:31 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x393}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x672}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:31 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x512}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:31 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:31 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x21}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:31 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5a4}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1d9}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:32 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x644}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xc7}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:32 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x392}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2e7}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:32 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x80f}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2a9}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:32 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x130}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:32 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x628}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3ac}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:32 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xc7}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:32 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x87c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x642}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x8b3}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:33 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:33 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3ec}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:33 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:33 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x246}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1e2}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6d7}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6b6}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:33 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x688}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:33 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x245}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:33 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xf}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:33 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x4b4}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:33 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x315}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7da}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:33 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x423}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:33 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x709}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0x10, 0x0, 0x7}], 0x148, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:34 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x16}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x35f}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2d8}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x315}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x932}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:34 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x48d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6a4}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0x58, 0x0, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726"}], 0x190, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x33c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xa5}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:34 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:34 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2b6}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x815}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:34 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7c1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x34f}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:34 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:34 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x344}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1d4}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:35 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1af}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7c1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1ae}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x766}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:35 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x887}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:35 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:35 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x669}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x268}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:35 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xa0010000, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x813}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:35 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x271}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:35 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3f6}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:35 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5ec}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x108}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:36 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x5, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:36 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) 23:26:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x75d}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3b8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:36 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x5, r1, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x424}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6ca}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:36 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x5, r1, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) socket$kcm(0x29, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x11, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x40, 0x0, 0x72, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5be}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x651}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x8d9}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x59f}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xfeffffff00000000, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x813}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:36 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x5, r1, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) socket$kcm(0x29, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x11, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x40, 0x0, 0x72, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0xffffffffa0010000, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x813}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:36 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1c8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x876}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5a3}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x42d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:37 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x747}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5c1}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:37 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x5, r1, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640)=[{&(0x7f00000105c0)="4b151bc9a78c5995b0f75ee4da98e702cc3d15041d07ea1117d4702ddab9fb032901af4cbbaccfe5ed14d9bfc933529f2b2253f05445f8271034a472873d17c24c6d4efc7521e7fc588b32a500f3ac17aafa379f3b688e17a6664be4cbab9fe203c6805c718c259968384631260e82651996af75aeea0d1281e6f90c", 0x7c}], 0x1, &(0x7f0000010680)=[{0xd8, 0x105, 0x3, "0f4c64fe5e2b7bfbc356c3278d48d2753ed6408c985141da6d6b3dcc27a4cac80a5df3f4cbf1cc47467ddba31265711d8810baaa8447dd77e4ee2d7d0de6dcae23f816537a2e719514b269fe5d74d45bcfed5bfecaf98f891730656e8031d743a9574095da0584235e9c184f923e9fc4564dbecf10a3354971d312633badde6a3b6f35a6de8a5cbc3a7291a2ced4f66e48ca4908337f804bedce07f32864a101d689d8e638750b4caff6f6e7b19c83a4656800487f4b66f5b6a71ecd09739746f4759795ed4d63"}, {0x18, 0x119, 0x10000, "11e70b8a"}, {0x28, 0x100, 0x9, "71f1dc0c91227c2714aaaa254a43852057d1"}, {0x20, 0x119, 0x1, "6c5914e84004c5ddfc54b0790c326a28"}, {0xa0, 0x110, 0x7, "ae4b4d34571cf168f36a604be66539c4582ee6a5e8d74ad0d2e3d1a730450b252b225bc96f87fdc9d689510f5c6820c5b0725038ee0d7a94dcb49f722107f378889a809726cbb74e420936bf18d04f01b28cfd03784b297d4f2bc1a4195048dc355aa37080123c3ddc91e13a416ddb9590ac3d7c7bb0032a8ceaa111fce6f8a23871026fd80a7f577a"}], 0x1d8, 0x8000}, 0x20004005) socketpair(0xf, 0x8000a, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) socket$kcm(0x29, 0x5, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x11, 0x0, 0x0, 0x4, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x40, 0x0, 0x72, 0x800, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0xffffffffffffffe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:37 executing program 3 (fault-call:6 fault-nth:0): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:37 executing program 4 (fault-call:6 fault-nth:0): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x113}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1573.070197] FAULT_INJECTION: forcing a failure. [ 1573.070197] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.085967] FAULT_INJECTION: forcing a failure. [ 1573.085967] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.116307] CPU: 1 PID: 798 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1573.123520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1573.132881] Call Trace: [ 1573.135487] dump_stack+0x1c4/0x2b6 [ 1573.139155] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1573.144382] should_fail.cold.4+0xa/0x17 [ 1573.148467] ? find_held_lock+0x36/0x1c0 [ 1573.152550] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1573.157671] ? __fget+0x4aa/0x740 [ 1573.161160] ? graph_lock+0x170/0x170 [ 1573.164984] ? kasan_check_read+0x11/0x20 [ 1573.169144] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1573.174436] ? rcu_bh_qs+0xc0/0xc0 [ 1573.177994] ? find_held_lock+0x36/0x1c0 [ 1573.182102] ? ___might_sleep+0x1ed/0x300 [ 1573.186260] ? __f_unlock_pos+0x19/0x20 [ 1573.190247] ? arch_local_save_flags+0x40/0x40 [ 1573.194843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1573.200401] __should_failslab+0x124/0x180 [ 1573.204653] should_failslab+0x9/0x14 [ 1573.208496] __kmalloc+0x2d4/0x760 [ 1573.212051] ? __fget_light+0x2e9/0x430 [ 1573.216044] ? bpf_test_init.isra.10+0x98/0x100 [ 1573.220737] bpf_test_init.isra.10+0x98/0x100 [ 1573.225258] bpf_prog_test_run_skb+0x103/0xcb0 [ 1573.229849] ? cap_capable+0x1f9/0x260 [ 1573.233756] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1573.238607] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1573.244168] ? fput+0x130/0x1a0 [ 1573.247462] ? __bpf_prog_get+0x9b/0x290 [ 1573.251556] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1573.256410] bpf_prog_test_run+0x130/0x1a0 [ 1573.260661] __x64_sys_bpf+0x3d8/0x520 [ 1573.264564] ? bpf_prog_get+0x20/0x20 [ 1573.268400] do_syscall_64+0x1b9/0x820 [ 1573.272332] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1573.277714] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1573.282667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1573.287544] ? trace_hardirqs_on_caller+0x310/0x310 [ 1573.292568] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1573.297605] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1573.302640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1573.307525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1573.312717] RIP: 0033:0x457569 [ 1573.315922] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1573.334830] RSP: 002b:00007f42fa272c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1573.342572] RAX: ffffffffffffffda RBX: 00007f42fa272c90 RCX: 0000000000457569 [ 1573.349850] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1573.357138] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1573.364412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42fa2736d4 23:26:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x420}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:37 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x12}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) [ 1573.371691] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000005 [ 1573.386505] CPU: 0 PID: 799 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #133 [ 1573.393721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1573.403101] Call Trace: [ 1573.405739] dump_stack+0x1c4/0x2b6 [ 1573.409386] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1573.414620] should_fail.cold.4+0xa/0x17 [ 1573.414640] ? find_held_lock+0x36/0x1c0 [ 1573.414681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1573.414703] ? __fget+0x4aa/0x740 [ 1573.414725] ? graph_lock+0x170/0x170 [ 1573.435160] ? kasan_check_read+0x11/0x20 [ 1573.439319] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1573.444604] ? rcu_bh_qs+0xc0/0xc0 [ 1573.448154] ? find_held_lock+0x36/0x1c0 [ 1573.452245] ? ___might_sleep+0x1ed/0x300 [ 1573.456398] ? __f_unlock_pos+0x19/0x20 [ 1573.460380] ? arch_local_save_flags+0x40/0x40 [ 1573.464997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1573.470546] __should_failslab+0x124/0x180 [ 1573.474792] should_failslab+0x9/0x14 [ 1573.478598] __kmalloc+0x2d4/0x760 [ 1573.482150] ? __fget_light+0x2e9/0x430 [ 1573.486132] ? bpf_test_init.isra.10+0x98/0x100 [ 1573.490811] bpf_test_init.isra.10+0x98/0x100 [ 1573.495319] bpf_prog_test_run_skb+0x103/0xcb0 [ 1573.499904] ? cap_capable+0x1f9/0x260 [ 1573.503807] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1573.508652] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1573.514212] ? fput+0x130/0x1a0 [ 1573.517502] ? __bpf_prog_get+0x9b/0x290 [ 1573.521571] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1573.526417] bpf_prog_test_run+0x130/0x1a0 [ 1573.530663] __x64_sys_bpf+0x3d8/0x520 [ 1573.534558] ? bpf_prog_get+0x20/0x20 [ 1573.538384] do_syscall_64+0x1b9/0x820 [ 1573.542282] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1573.547652] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1573.552583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1573.557437] ? trace_hardirqs_on_caller+0x310/0x310 [ 1573.562461] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1573.567485] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1573.572512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1573.577371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1573.582561] RIP: 0033:0x457569 [ 1573.585762] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1573.604668] RSP: 002b:00007f9bd0bdec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1573.612384] RAX: ffffffffffffffda RBX: 00007f9bd0bdec90 RCX: 0000000000457569 [ 1573.619656] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1573.626942] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1573.634237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9bd0bdf6d4 [ 1573.641506] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000005 23:26:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1d3}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:38 executing program 3 (fault-call:6 fault-nth:1): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:38 executing program 1 (fault-call:4 fault-nth:0): recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7e9}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1573.871967] FAULT_INJECTION: forcing a failure. [ 1573.871967] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.909534] CPU: 0 PID: 823 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #133 23:26:38 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1573.916775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1573.926144] Call Trace: [ 1573.928765] dump_stack+0x1c4/0x2b6 [ 1573.932413] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1573.937635] should_fail.cold.4+0xa/0x17 [ 1573.941723] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1573.946843] ? save_stack+0x43/0xd0 [ 1573.950480] ? kasan_kmalloc+0xc7/0xe0 [ 1573.954375] ? __kmalloc+0x14e/0x760 [ 1573.958110] ? bpf_test_init.isra.10+0x98/0x100 [ 1573.962792] ? bpf_prog_test_run_skb+0x103/0xcb0 [ 1573.967567] ? graph_lock+0x170/0x170 [ 1573.971390] ? rcu_bh_qs+0xc0/0xc0 [ 1573.974957] ? find_held_lock+0x36/0x1c0 [ 1573.979045] ? find_held_lock+0x36/0x1c0 [ 1573.983178] ? ___might_sleep+0x1ed/0x300 [ 1573.987344] ? arch_local_save_flags+0x40/0x40 [ 1573.991960] __should_failslab+0x124/0x180 [ 1573.996220] should_failslab+0x9/0x14 [ 1574.000035] kmem_cache_alloc_trace+0x2d7/0x750 [ 1574.004734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1574.010276] ? bpf_test_init.isra.10+0x70/0x100 [ 1574.014954] bpf_prog_test_run_skb+0x1d4/0xcb0 [ 1574.019540] ? cap_capable+0x1f9/0x260 [ 1574.023441] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1574.028293] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1574.033841] ? fput+0x130/0x1a0 [ 1574.037131] ? __bpf_prog_get+0x9b/0x290 [ 1574.041209] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1574.046055] bpf_prog_test_run+0x130/0x1a0 [ 1574.050327] __x64_sys_bpf+0x3d8/0x520 [ 1574.054223] ? bpf_prog_get+0x20/0x20 [ 1574.058052] do_syscall_64+0x1b9/0x820 [ 1574.061955] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1574.067347] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1574.072281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1574.077130] ? trace_hardirqs_on_caller+0x310/0x310 [ 1574.082152] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1574.087184] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1574.092213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1574.097106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1574.102305] RIP: 0033:0x457569 23:26:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x123}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:38 executing program 4 (fault-call:6 fault-nth:1): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) [ 1574.105507] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1574.124420] RSP: 002b:00007f9bd0bdec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1574.132153] RAX: ffffffffffffffda RBX: 00007f9bd0bdec90 RCX: 0000000000457569 [ 1574.139438] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1574.146712] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1574.153982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9bd0bdf6d4 [ 1574.161253] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000005 23:26:38 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x107}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) [ 1574.260624] FAULT_INJECTION: forcing a failure. [ 1574.260624] name failslab, interval 1, probability 0, space 0, times 0 [ 1574.294787] CPU: 1 PID: 842 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1574.302022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1574.311381] Call Trace: [ 1574.313987] dump_stack+0x1c4/0x2b6 [ 1574.317630] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1574.322849] should_fail.cold.4+0xa/0x17 [ 1574.326928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1574.332046] ? save_stack+0x43/0xd0 [ 1574.335704] ? kasan_kmalloc+0xc7/0xe0 [ 1574.339593] ? __kmalloc+0x14e/0x760 [ 1574.343342] ? bpf_test_init.isra.10+0x98/0x100 [ 1574.348038] ? bpf_prog_test_run_skb+0x103/0xcb0 [ 1574.352827] ? graph_lock+0x170/0x170 [ 1574.356635] ? rcu_bh_qs+0xc0/0xc0 [ 1574.360190] ? find_held_lock+0x36/0x1c0 [ 1574.364271] ? find_held_lock+0x36/0x1c0 [ 1574.368360] ? ___might_sleep+0x1ed/0x300 [ 1574.372521] ? arch_local_save_flags+0x40/0x40 [ 1574.377129] __should_failslab+0x124/0x180 [ 1574.381377] should_failslab+0x9/0x14 [ 1574.385188] kmem_cache_alloc_trace+0x2d7/0x750 [ 1574.389873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1574.395420] ? bpf_test_init.isra.10+0x70/0x100 [ 1574.400107] bpf_prog_test_run_skb+0x1d4/0xcb0 [ 1574.404697] ? cap_capable+0x1f9/0x260 [ 1574.408602] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1574.413448] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1574.418995] ? fput+0x130/0x1a0 [ 1574.422287] ? __bpf_prog_get+0x9b/0x290 [ 1574.426356] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1574.431201] bpf_prog_test_run+0x130/0x1a0 [ 1574.435450] __x64_sys_bpf+0x3d8/0x520 [ 1574.439345] ? bpf_prog_get+0x20/0x20 [ 1574.443173] do_syscall_64+0x1b9/0x820 [ 1574.447067] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1574.452452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1574.457385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1574.462241] ? trace_hardirqs_on_caller+0x310/0x310 [ 1574.467265] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1574.472292] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1574.477326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1574.482189] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1574.487383] RIP: 0033:0x457569 [ 1574.490583] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:39 executing program 3 (fault-call:6 fault-nth:2): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1574.509492] RSP: 002b:00007f42fa272c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1574.517212] RAX: ffffffffffffffda RBX: 00007f42fa272c90 RCX: 0000000000457569 [ 1574.524486] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1574.531756] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1574.539028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42fa2736d4 [ 1574.546299] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000005 [ 1574.622164] FAULT_INJECTION: forcing a failure. [ 1574.622164] name failslab, interval 1, probability 0, space 0, times 0 [ 1574.643284] CPU: 1 PID: 854 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #133 [ 1574.650503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1574.659860] Call Trace: [ 1574.659888] dump_stack+0x1c4/0x2b6 [ 1574.659915] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1574.659945] ? kasan_check_read+0x11/0x20 [ 1574.675474] ? __debug_object_init+0x57d/0x1290 [ 1574.680189] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1574.685666] should_fail.cold.4+0xa/0x17 [ 1574.689768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1574.694896] ? __debug_object_init+0x57d/0x1290 [ 1574.699586] ? rcu_bh_qs+0xc0/0xc0 [ 1574.703139] ? unwind_dump+0x190/0x190 [ 1574.707045] ? debug_object_free+0x690/0x690 [ 1574.711484] ? is_bpf_text_address+0xd3/0x170 [ 1574.716013] ? kernel_text_address+0x79/0xf0 [ 1574.720435] ? __kernel_text_address+0xd/0x40 [ 1574.724961] ? unwind_get_return_address+0x61/0xa0 [ 1574.729924] ? __save_stack_trace+0x8d/0xf0 [ 1574.734293] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1574.739852] ? check_preemption_disabled+0x48/0x280 [ 1574.744925] ? check_preemption_disabled+0x48/0x280 [ 1574.749980] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1574.755268] ? kasan_kmalloc+0xc7/0xe0 [ 1574.759169] ? rcu_pm_notify+0xc0/0xc0 [ 1574.763087] __should_failslab+0x124/0x180 [ 1574.767344] should_failslab+0x9/0x14 [ 1574.771175] kmem_cache_alloc+0x47/0x730 [ 1574.775252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1574.781302] ? __phys_addr+0xa6/0x120 [ 1574.785113] ? kasan_unpoison_shadow+0x35/0x50 [ 1574.789717] __build_skb+0xab/0x430 [ 1574.793353] ? skb_try_coalesce+0x1b70/0x1b70 [ 1574.797864] ? kasan_check_write+0x14/0x20 [ 1574.802118] ? sock_init_data+0x9b1/0xdc0 [ 1574.806276] ? rcu_pm_notify+0xc0/0xc0 [ 1574.810174] ? sk_stop_timer+0x50/0x50 [ 1574.814093] build_skb+0x77/0x270 [ 1574.817561] ? rcu_read_lock_sched_held+0x108/0x120 [ 1574.822589] ? __build_skb+0x430/0x430 [ 1574.826509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1574.832057] ? bpf_test_init.isra.10+0x70/0x100 [ 1574.836750] bpf_prog_test_run_skb+0x283/0xcb0 [ 1574.841344] ? cap_capable+0x1f9/0x260 [ 1574.845253] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1574.850115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1574.855666] ? fput+0x130/0x1a0 [ 1574.858959] ? __bpf_prog_get+0x9b/0x290 [ 1574.863034] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1574.867889] bpf_prog_test_run+0x130/0x1a0 [ 1574.872146] __x64_sys_bpf+0x3d8/0x520 [ 1574.876047] ? bpf_prog_get+0x20/0x20 [ 1574.879889] do_syscall_64+0x1b9/0x820 [ 1574.883793] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1574.889168] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1574.894117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1574.898970] ? trace_hardirqs_on_caller+0x310/0x310 [ 1574.904000] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1574.909032] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1574.914085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1574.918951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1574.924152] RIP: 0033:0x457569 [ 1574.927359] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1574.946272] RSP: 002b:00007f9bd0bdec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1574.953996] RAX: ffffffffffffffda RBX: 00007f9bd0bdec90 RCX: 0000000000457569 [ 1574.961295] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a 23:26:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x532}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:39 executing program 4 (fault-call:6 fault-nth:2): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x4b5}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1574.968566] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1574.975848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9bd0bdf6d4 [ 1574.983126] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000005 23:26:39 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x516}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3bf}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) [ 1575.129555] FAULT_INJECTION: forcing a failure. [ 1575.129555] name failslab, interval 1, probability 0, space 0, times 0 [ 1575.201500] CPU: 0 PID: 871 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1575.208742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1575.218115] Call Trace: [ 1575.220742] dump_stack+0x1c4/0x2b6 [ 1575.224388] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1575.229586] ? kasan_check_read+0x11/0x20 [ 1575.233748] ? __debug_object_init+0x57d/0x1290 [ 1575.238434] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1575.243902] should_fail.cold.4+0xa/0x17 [ 1575.247978] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1575.253099] ? __debug_object_init+0x57d/0x1290 [ 1575.257779] ? rcu_bh_qs+0xc0/0xc0 [ 1575.261325] ? unwind_dump+0x190/0x190 [ 1575.265225] ? debug_object_free+0x690/0x690 [ 1575.269643] ? is_bpf_text_address+0xd3/0x170 [ 1575.274146] ? kernel_text_address+0x79/0xf0 [ 1575.278567] ? __kernel_text_address+0xd/0x40 [ 1575.283065] ? unwind_get_return_address+0x61/0xa0 [ 1575.288017] ? __save_stack_trace+0x8d/0xf0 [ 1575.292351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1575.297894] ? check_preemption_disabled+0x48/0x280 [ 1575.302911] ? check_preemption_disabled+0x48/0x280 [ 1575.307950] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1575.313228] ? kasan_kmalloc+0xc7/0xe0 [ 1575.317128] ? rcu_pm_notify+0xc0/0xc0 [ 1575.321031] __should_failslab+0x124/0x180 [ 1575.325276] should_failslab+0x9/0x14 [ 1575.329089] kmem_cache_alloc+0x47/0x730 [ 1575.333168] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1575.338723] ? __phys_addr+0xa6/0x120 [ 1575.342544] ? kasan_unpoison_shadow+0x35/0x50 [ 1575.347136] __build_skb+0xab/0x430 [ 1575.350767] ? skb_try_coalesce+0x1b70/0x1b70 [ 1575.355276] ? kasan_check_write+0x14/0x20 [ 1575.359515] ? sock_init_data+0x9b1/0xdc0 [ 1575.363666] ? rcu_pm_notify+0xc0/0xc0 [ 1575.367560] ? sk_stop_timer+0x50/0x50 [ 1575.371458] build_skb+0x77/0x270 [ 1575.374914] ? rcu_read_lock_sched_held+0x108/0x120 [ 1575.379934] ? __build_skb+0x430/0x430 [ 1575.383841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1575.389381] ? bpf_test_init.isra.10+0x70/0x100 [ 1575.394064] bpf_prog_test_run_skb+0x283/0xcb0 [ 1575.398663] ? cap_capable+0x1f9/0x260 [ 1575.402561] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1575.407407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1575.412960] ? fput+0x130/0x1a0 [ 1575.416264] ? __bpf_prog_get+0x9b/0x290 [ 1575.420335] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1575.425186] bpf_prog_test_run+0x130/0x1a0 [ 1575.429432] __x64_sys_bpf+0x3d8/0x520 [ 1575.433327] ? bpf_prog_get+0x20/0x20 [ 1575.437167] do_syscall_64+0x1b9/0x820 [ 1575.441066] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1575.446448] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1575.451379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1575.456228] ? trace_hardirqs_on_caller+0x310/0x310 [ 1575.461252] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1575.466276] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1575.471314] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1575.476177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1575.481370] RIP: 0033:0x457569 23:26:40 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1575.484567] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1575.503473] RSP: 002b:00007f42fa251c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1575.511195] RAX: ffffffffffffffda RBX: 00007f42fa251c90 RCX: 0000000000457569 [ 1575.518465] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1575.525734] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1575.533003] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42fa2526d4 [ 1575.540274] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000005 23:26:40 executing program 3 (fault-call:6 fault-nth:3): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3af}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x68d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x506}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1575.721259] FAULT_INJECTION: forcing a failure. [ 1575.721259] name failslab, interval 1, probability 0, space 0, times 0 [ 1575.733304] CPU: 0 PID: 892 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #133 [ 1575.740512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1575.749874] Call Trace: [ 1575.752499] dump_stack+0x1c4/0x2b6 [ 1575.756157] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1575.761386] should_fail.cold.4+0xa/0x17 [ 1575.765470] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1575.770589] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1575.775539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1575.780331] ? print_usage_bug+0xc0/0xc0 [ 1575.784402] ? is_bpf_text_address+0xac/0x170 [ 1575.788909] ? lock_downgrade+0x900/0x900 [ 1575.793066] ? check_preemption_disabled+0x48/0x280 [ 1575.798125] ? rcu_bh_qs+0xc0/0xc0 [ 1575.801679] ? __lock_acquire+0x7ec/0x4ec0 [ 1575.805932] ? is_bpf_text_address+0xd3/0x170 [ 1575.810439] ? kernel_text_address+0x79/0xf0 [ 1575.814880] __should_failslab+0x124/0x180 [ 1575.819131] should_failslab+0x9/0x14 [ 1575.822944] kmem_cache_alloc+0x47/0x730 [ 1575.827030] skb_clone+0x1bb/0x500 [ 1575.830584] ? skb_split+0x11e0/0x11e0 [ 1575.834478] ? kmem_cache_alloc+0x12e/0x730 [ 1575.838823] ? build_skb+0x77/0x270 [ 1575.842492] ? bpf_prog_test_run_skb+0x283/0xcb0 [ 1575.847275] ? bpf_prog_test_run+0x130/0x1a0 [ 1575.851689] ? __x64_sys_bpf+0x3d8/0x520 [ 1575.855773] ? do_syscall_64+0x1b9/0x820 [ 1575.859847] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1575.865227] ? kernel_text_address+0x79/0xf0 [ 1575.869647] ? __kernel_text_address+0xd/0x40 [ 1575.874160] bpf_clone_redirect+0xb9/0x490 [ 1575.878418] bpf_prog_c39d1ba309a769f7+0x858/0x1000 [ 1575.883445] ? ctrl_getfamily+0x290/0x420 [ 1575.887608] ? lock_downgrade+0x900/0x900 [ 1575.891763] ? ktime_get+0x352/0x440 [ 1575.895493] ? pvclock_read_flags+0x160/0x160 [ 1575.899999] ? bpf_test_run+0x175/0x780 [ 1575.903982] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1575.909453] ? lock_acquire+0x1ed/0x520 [ 1575.913433] ? bpf_test_run+0x3cb/0x780 [ 1575.917418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1575.922980] ? check_preemption_disabled+0x48/0x280 [ 1575.928016] ? kasan_check_read+0x11/0x20 [ 1575.932182] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1575.937473] ? rcu_bh_qs+0xc0/0xc0 [ 1575.941024] ? bpf_cgroup_storage_release+0x220/0x220 [ 1575.946226] ? skb_try_coalesce+0x1b70/0x1b70 [ 1575.950740] ? bpf_test_run+0x25d/0x780 [ 1575.954747] ? netlink_diag_dump+0x2a0/0x2a0 [ 1575.959184] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1575.963961] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1575.968824] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1575.973676] ? bpf_prog_test_run+0x130/0x1a0 [ 1575.978108] ? __x64_sys_bpf+0x3d8/0x520 [ 1575.982181] ? bpf_prog_get+0x20/0x20 [ 1575.986027] ? do_syscall_64+0x1b9/0x820 [ 1575.990110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1575.995486] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1576.000427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1576.005285] ? trace_hardirqs_on_caller+0x310/0x310 [ 1576.010311] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1576.015344] ? prepare_exit_to_usermode+0x291/0x3b0 23:26:40 executing program 4 (fault-call:6 fault-nth:3): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:40 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1576.020376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1576.025270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1576.101125] FAULT_INJECTION: forcing a failure. [ 1576.101125] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.112622] CPU: 1 PID: 909 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1576.119827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1576.129185] Call Trace: [ 1576.131792] dump_stack+0x1c4/0x2b6 [ 1576.135442] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1576.140698] should_fail.cold.4+0xa/0x17 [ 1576.144789] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1576.149923] ? print_usage_bug+0xc0/0xc0 [ 1576.153993] ? is_bpf_text_address+0xac/0x170 [ 1576.158498] ? lock_downgrade+0x900/0x900 [ 1576.162657] ? check_preemption_disabled+0x48/0x280 [ 1576.167704] ? rcu_bh_qs+0xc0/0xc0 [ 1576.171263] ? __lock_acquire+0x7ec/0x4ec0 [ 1576.175508] ? is_bpf_text_address+0xd3/0x170 [ 1576.180013] ? kernel_text_address+0x79/0xf0 [ 1576.184433] __should_failslab+0x124/0x180 [ 1576.188693] should_failslab+0x9/0x14 [ 1576.192501] kmem_cache_alloc+0x47/0x730 [ 1576.196578] skb_clone+0x1bb/0x500 [ 1576.200126] ? skb_split+0x11e0/0x11e0 [ 1576.204017] ? kmem_cache_alloc+0x12e/0x730 [ 1576.208343] ? build_skb+0x77/0x270 [ 1576.211975] ? bpf_prog_test_run_skb+0x283/0xcb0 [ 1576.216737] ? bpf_prog_test_run+0x130/0x1a0 [ 1576.221150] ? __x64_sys_bpf+0x3d8/0x520 [ 1576.225232] ? do_syscall_64+0x1b9/0x820 [ 1576.229300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1576.234678] ? kernel_text_address+0x79/0xf0 [ 1576.239102] ? __kernel_text_address+0xd/0x40 [ 1576.243610] bpf_clone_redirect+0xb9/0x490 [ 1576.247874] bpf_prog_c39d1ba309a769f7+0xf9a/0x1000 [ 1576.252910] ? ctrl_getfamily+0x290/0x420 [ 1576.257064] ? lock_downgrade+0x900/0x900 [ 1576.261227] ? ktime_get+0x352/0x440 [ 1576.264953] ? pvclock_read_flags+0x160/0x160 [ 1576.269450] ? bpf_test_run+0x175/0x780 [ 1576.273434] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1576.278906] ? lock_acquire+0x1ed/0x520 [ 1576.282883] ? bpf_test_run+0x3cb/0x780 [ 1576.286861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1576.292404] ? check_preemption_disabled+0x48/0x280 [ 1576.297432] ? kasan_check_read+0x11/0x20 [ 1576.301586] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1576.306869] ? rcu_bh_qs+0xc0/0xc0 [ 1576.310413] ? bpf_cgroup_storage_release+0x220/0x220 [ 1576.315612] ? skb_try_coalesce+0x1b70/0x1b70 [ 1576.320126] ? bpf_test_run+0x25d/0x780 [ 1576.324122] ? netlink_diag_dump+0x2a0/0x2a0 [ 1576.328539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1576.334088] ? bpf_test_init.isra.10+0x70/0x100 [ 1576.338773] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1576.343559] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1576.348404] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1576.353950] ? fput+0x130/0x1a0 [ 1576.357246] ? __bpf_prog_get+0x9b/0x290 [ 1576.361319] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1576.366165] ? bpf_prog_test_run+0x130/0x1a0 [ 1576.370590] ? __x64_sys_bpf+0x3d8/0x520 [ 1576.374654] ? bpf_prog_get+0x20/0x20 [ 1576.378488] ? do_syscall_64+0x1b9/0x820 [ 1576.382557] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1576.387929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1576.392890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1576.397742] ? trace_hardirqs_on_caller+0x310/0x310 [ 1576.402769] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1576.407797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1576.412654] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:40 executing program 3 (fault-call:6 fault-nth:4): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1ed}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:41 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6d}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x366}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:41 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x51d}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1576.768271] FAULT_INJECTION: forcing a failure. [ 1576.768271] name failslab, interval 1, probability 0, space 0, times 0 [ 1576.779857] CPU: 0 PID: 940 Comm: syz-executor3 Not tainted 4.19.0-rc8+ #133 [ 1576.787081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1576.796448] Call Trace: [ 1576.799058] dump_stack+0x1c4/0x2b6 [ 1576.802725] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1576.807952] should_fail.cold.4+0xa/0x17 [ 1576.812039] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1576.817172] ? graph_lock+0x170/0x170 [ 1576.820992] ? lock_release+0x4d2/0x970 [ 1576.824983] ? is_bpf_text_address+0xac/0x170 [ 1576.829496] ? find_held_lock+0x36/0x1c0 [ 1576.833582] ? depot_save_stack+0x292/0x470 [ 1576.837920] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1576.843030] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1576.848143] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1576.852753] ? trace_hardirqs_on+0xbd/0x310 [ 1576.857091] ? kasan_check_read+0x11/0x20 [ 1576.861281] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1576.866748] ? kasan_check_write+0x14/0x20 [ 1576.870992] ? do_raw_spin_lock+0xc1/0x230 [ 1576.875256] __should_failslab+0x124/0x180 [ 1576.879508] should_failslab+0x9/0x14 [ 1576.883319] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1576.888345] ? save_stack+0xa9/0xd0 [ 1576.891981] ? save_stack+0x43/0xd0 [ 1576.895627] __kmalloc_node_track_caller+0x33/0x70 [ 1576.900570] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1576.905345] pskb_expand_head+0x230/0x10f0 [ 1576.909596] ? memcpy+0x45/0x50 [ 1576.912886] ? __copy_skb_header+0x350/0x6b0 [ 1576.917304] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1576.921810] ? skb_checksum+0x140/0x140 [ 1576.925808] ? __lock_is_held+0xb5/0x140 [ 1576.929891] ? kasan_check_write+0x14/0x20 [ 1576.934136] ? __skb_clone+0x6c7/0xa00 [ 1576.938042] ? __copy_skb_header+0x6b0/0x6b0 [ 1576.942465] ? kmem_cache_alloc+0x33a/0x730 [ 1576.946809] skb_ensure_writable+0x3dd/0x640 [ 1576.951230] ? skb_cow_data+0xf10/0xf10 [ 1576.955214] ? kmem_cache_alloc+0x12e/0x730 [ 1576.959544] ? build_skb+0x77/0x270 [ 1576.963186] ? bpf_prog_test_run_skb+0x283/0xcb0 [ 1576.967950] ? bpf_prog_test_run+0x130/0x1a0 [ 1576.972364] ? __x64_sys_bpf+0x3d8/0x520 [ 1576.976433] ? do_syscall_64+0x1b9/0x820 [ 1576.980508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1576.985886] ? kernel_text_address+0x79/0xf0 [ 1576.990307] ? __kernel_text_address+0xd/0x40 [ 1576.994822] bpf_clone_redirect+0x14a/0x490 [ 1576.999166] bpf_prog_c39d1ba309a769f7+0x695/0x1000 [ 1577.004200] ? ctrl_getfamily+0x290/0x420 [ 1577.008360] ? lock_downgrade+0x900/0x900 [ 1577.012516] ? ktime_get+0x352/0x440 [ 1577.016269] ? pvclock_read_flags+0x160/0x160 [ 1577.020770] ? bpf_test_run+0x175/0x780 [ 1577.024756] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1577.030225] ? lock_acquire+0x1ed/0x520 [ 1577.034213] ? bpf_test_run+0x3cb/0x780 [ 1577.038200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1577.043747] ? check_preemption_disabled+0x48/0x280 [ 1577.048779] ? kasan_check_read+0x11/0x20 [ 1577.052943] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1577.058234] ? rcu_bh_qs+0xc0/0xc0 [ 1577.061782] ? bpf_cgroup_storage_release+0x220/0x220 [ 1577.067002] ? skb_try_coalesce+0x1b70/0x1b70 [ 1577.071544] ? bpf_test_run+0x25d/0x780 [ 1577.075588] ? netlink_diag_dump+0x2a0/0x2a0 [ 1577.080009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1577.085556] ? bpf_test_init.isra.10+0x70/0x100 [ 1577.090244] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1577.095021] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1577.099873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1577.105422] ? fput+0x130/0x1a0 [ 1577.108715] ? __bpf_prog_get+0x9b/0x290 [ 1577.112789] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1577.117638] ? bpf_prog_test_run+0x130/0x1a0 [ 1577.122060] ? __x64_sys_bpf+0x3d8/0x520 [ 1577.126141] ? bpf_prog_get+0x20/0x20 [ 1577.129979] ? do_syscall_64+0x1b9/0x820 [ 1577.134056] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1577.139438] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1577.144376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1577.149234] ? trace_hardirqs_on_caller+0x310/0x310 [ 1577.154262] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1577.159297] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1577.164329] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6da}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) [ 1577.169216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x24c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:41 executing program 4 (fault-call:6 fault-nth:4): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:41 executing program 3 (fault-call:6 fault-nth:5): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x633}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1577.366895] FAULT_INJECTION: forcing a failure. [ 1577.366895] name failslab, interval 1, probability 0, space 0, times 0 [ 1577.378398] CPU: 0 PID: 963 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1577.385602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1577.394976] Call Trace: [ 1577.397604] dump_stack+0x1c4/0x2b6 [ 1577.401261] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1577.406489] should_fail.cold.4+0xa/0x17 [ 1577.410581] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1577.415705] ? graph_lock+0x170/0x170 [ 1577.419520] ? find_held_lock+0x36/0x1c0 [ 1577.423608] ? is_bpf_text_address+0xac/0x170 [ 1577.428134] ? find_held_lock+0x36/0x1c0 [ 1577.432216] ? depot_save_stack+0x292/0x470 [ 1577.436551] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1577.441659] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1577.446769] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1577.451362] ? trace_hardirqs_on+0xbd/0x310 [ 1577.455691] ? kasan_check_read+0x11/0x20 [ 1577.459850] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1577.465310] ? kasan_check_write+0x14/0x20 [ 1577.469549] ? do_raw_spin_lock+0xc1/0x230 [ 1577.473794] __should_failslab+0x124/0x180 [ 1577.478038] should_failslab+0x9/0x14 [ 1577.481850] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1577.486875] ? save_stack+0xa9/0xd0 [ 1577.490513] ? save_stack+0x43/0xd0 [ 1577.494157] __kmalloc_node_track_caller+0x33/0x70 [ 1577.499105] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1577.503910] pskb_expand_head+0x230/0x10f0 [ 1577.508159] ? memcpy+0x45/0x50 [ 1577.511623] ? __copy_skb_header+0x350/0x6b0 [ 1577.516043] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1577.520549] ? skb_checksum+0x140/0x140 [ 1577.524537] ? __lock_is_held+0xb5/0x140 [ 1577.528610] ? kasan_check_write+0x14/0x20 [ 1577.532846] ? __skb_clone+0x6c7/0xa00 [ 1577.536742] ? __copy_skb_header+0x6b0/0x6b0 [ 1577.541170] ? kmem_cache_alloc+0x33a/0x730 [ 1577.545515] skb_ensure_writable+0x3dd/0x640 [ 1577.549952] ? skb_cow_data+0xf10/0xf10 [ 1577.553929] ? kmem_cache_alloc+0x12e/0x730 [ 1577.558267] ? build_skb+0x77/0x270 [ 1577.561900] ? bpf_prog_test_run_skb+0x283/0xcb0 [ 1577.566657] ? bpf_prog_test_run+0x130/0x1a0 [ 1577.571066] ? __x64_sys_bpf+0x3d8/0x520 [ 1577.575186] ? do_syscall_64+0x1b9/0x820 [ 1577.579256] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1577.584649] ? kernel_text_address+0x79/0xf0 [ 1577.589088] ? __kernel_text_address+0xd/0x40 [ 1577.593613] bpf_clone_redirect+0x14a/0x490 [ 1577.597946] bpf_prog_c39d1ba309a769f7+0x155/0x1000 [ 1577.602968] ? ctrl_getfamily+0x290/0x420 [ 1577.607126] ? lock_downgrade+0x900/0x900 [ 1577.611277] ? ktime_get+0x352/0x440 [ 1577.615003] ? pvclock_read_flags+0x160/0x160 [ 1577.619498] ? bpf_test_run+0x175/0x780 [ 1577.623477] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1577.628945] ? lock_acquire+0x1ed/0x520 [ 1577.632924] ? bpf_test_run+0x3cb/0x780 [ 1577.636931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1577.642475] ? check_preemption_disabled+0x48/0x280 [ 1577.647894] ? kasan_check_read+0x11/0x20 [ 1577.652050] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1577.657342] ? rcu_bh_qs+0xc0/0xc0 [ 1577.660889] ? bpf_cgroup_storage_release+0x220/0x220 [ 1577.666120] ? skb_try_coalesce+0x1b70/0x1b70 [ 1577.670646] ? bpf_test_run+0x25d/0x780 [ 1577.674668] ? netlink_diag_dump+0x2a0/0x2a0 [ 1577.679146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1577.684709] ? bpf_test_init.isra.10+0x70/0x100 [ 1577.689408] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1577.694183] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1577.699027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1577.704568] ? fput+0x130/0x1a0 [ 1577.707861] ? __bpf_prog_get+0x9b/0x290 [ 1577.711946] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1577.716792] ? bpf_prog_test_run+0x130/0x1a0 [ 1577.721217] ? __x64_sys_bpf+0x3d8/0x520 [ 1577.725282] ? bpf_prog_get+0x20/0x20 [ 1577.729118] ? do_syscall_64+0x1b9/0x820 [ 1577.733228] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1577.738599] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1577.743555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1577.748406] ? trace_hardirqs_on_caller+0x310/0x310 [ 1577.753431] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1577.758488] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:42 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1577.763347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5c1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:42 executing program 4 (fault-call:6 fault-nth:5): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:42 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x493}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x24e}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:42 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1578.050162] FAULT_INJECTION: forcing a failure. [ 1578.050162] name failslab, interval 1, probability 0, space 0, times 0 [ 1578.061648] CPU: 1 PID: 998 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1578.068853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1578.078222] Call Trace: [ 1578.080845] dump_stack+0x1c4/0x2b6 [ 1578.084494] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1578.089713] ? __lock_is_held+0xb5/0x140 [ 1578.093802] should_fail.cold.4+0xa/0x17 [ 1578.097881] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1578.102999] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1578.108292] ? kasan_unpoison_shadow+0x35/0x50 [ 1578.112885] ? skb_tx_error+0x2f0/0x2f0 [ 1578.116878] ? __kmalloc_node_track_caller+0x47/0x70 [ 1578.121997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1578.127547] ? print_usage_bug+0xc0/0xc0 [ 1578.131625] ? kasan_check_write+0x14/0x20 [ 1578.135872] ? pskb_expand_head+0x6b3/0x10f0 [ 1578.140307] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1578.144820] ? __lock_acquire+0x7ec/0x4ec0 [ 1578.149092] __should_failslab+0x124/0x180 [ 1578.153348] should_failslab+0x9/0x14 [ 1578.157160] kmem_cache_alloc+0x47/0x730 [ 1578.161245] skb_clone+0x1bb/0x500 [ 1578.164808] ? skb_split+0x11e0/0x11e0 [ 1578.168713] ? check_preemption_disabled+0x48/0x280 [ 1578.173744] ? __this_cpu_preempt_check+0x1c/0x20 [ 1578.178600] ? __bpf_redirect+0x54b/0xb20 [ 1578.182779] bpf_clone_redirect+0xb9/0x490 [ 1578.187038] bpf_prog_c39d1ba309a769f7+0xc51/0x1000 [ 1578.192082] ? ctrl_getfamily+0x290/0x420 [ 1578.196252] ? lock_downgrade+0x900/0x900 [ 1578.200409] ? ktime_get+0x352/0x440 [ 1578.204146] ? find_held_lock+0x36/0x1c0 [ 1578.208229] ? lock_acquire+0x1ed/0x520 [ 1578.212222] ? bpf_test_run+0x3cb/0x780 [ 1578.216210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1578.221760] ? check_preemption_disabled+0x48/0x280 [ 1578.226793] ? kasan_check_read+0x11/0x20 [ 1578.230953] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1578.236246] ? rcu_bh_qs+0xc0/0xc0 [ 1578.239800] ? bpf_cgroup_storage_release+0x220/0x220 [ 1578.245002] ? skb_try_coalesce+0x1b70/0x1b70 [ 1578.249521] ? bpf_test_run+0x25d/0x780 [ 1578.253519] ? netlink_diag_dump+0x2a0/0x2a0 [ 1578.257942] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1578.263488] ? bpf_test_init.isra.10+0x70/0x100 [ 1578.268177] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1578.272956] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1578.277811] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1578.283361] ? fput+0x130/0x1a0 [ 1578.286654] ? __bpf_prog_get+0x9b/0x290 [ 1578.290730] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1578.295600] ? bpf_prog_test_run+0x130/0x1a0 [ 1578.300023] ? __x64_sys_bpf+0x3d8/0x520 [ 1578.304109] ? bpf_prog_get+0x20/0x20 [ 1578.307943] ? do_syscall_64+0x1b9/0x820 [ 1578.312014] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1578.317393] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1578.322334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1578.327192] ? trace_hardirqs_on_caller+0x310/0x310 [ 1578.332222] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1578.337251] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1578.342300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1578.347167] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:42 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x4ad}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:42 executing program 4 (fault-call:6 fault-nth:6): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:42 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:42 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5cd}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2dd}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x60f}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) [ 1578.675481] FAULT_INJECTION: forcing a failure. [ 1578.675481] name failslab, interval 1, probability 0, space 0, times 0 [ 1578.686860] CPU: 1 PID: 1041 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1578.694160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1578.703526] Call Trace: [ 1578.706145] dump_stack+0x1c4/0x2b6 [ 1578.709806] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1578.715015] ? find_held_lock+0x36/0x1c0 [ 1578.719130] should_fail.cold.4+0xa/0x17 [ 1578.723220] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1578.728348] ? find_held_lock+0x36/0x1c0 [ 1578.732434] ? is_bpf_text_address+0xac/0x170 [ 1578.736945] ? lock_downgrade+0x900/0x900 [ 1578.741121] ? check_preemption_disabled+0x48/0x280 [ 1578.746160] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1578.751973] ? kasan_check_read+0x11/0x20 [ 1578.756137] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1578.761425] ? rcu_bh_qs+0xc0/0xc0 [ 1578.764982] ? rcu_bh_qs+0xc0/0xc0 [ 1578.768532] ? unwind_dump+0x190/0x190 [ 1578.772443] ? is_bpf_text_address+0xd3/0x170 [ 1578.776951] ? kernel_text_address+0x79/0xf0 [ 1578.781832] ? __kernel_text_address+0xd/0x40 [ 1578.786338] ? unwind_get_return_address+0x61/0xa0 [ 1578.791282] ? __save_stack_trace+0x8d/0xf0 [ 1578.795619] __should_failslab+0x124/0x180 [ 1578.799880] should_failslab+0x9/0x14 [ 1578.803701] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1578.808733] ? save_stack+0xa9/0xd0 [ 1578.812373] ? save_stack+0x43/0xd0 [ 1578.816020] __kmalloc_node_track_caller+0x33/0x70 [ 1578.820962] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1578.825733] pskb_expand_head+0x230/0x10f0 [ 1578.829982] ? memcpy+0x45/0x50 [ 1578.833277] ? __copy_skb_header+0x350/0x6b0 [ 1578.837703] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1578.842234] ? skb_checksum+0x140/0x140 [ 1578.846230] ? __lock_is_held+0xb5/0x140 [ 1578.850311] ? kasan_check_write+0x14/0x20 [ 1578.854565] ? __skb_clone+0x6c7/0xa00 [ 1578.858464] ? __copy_skb_header+0x6b0/0x6b0 [ 1578.862881] ? kmem_cache_alloc+0x33a/0x730 [ 1578.867228] skb_ensure_writable+0x3dd/0x640 [ 1578.871648] ? skb_cow_data+0xf10/0xf10 [ 1578.875636] ? check_preemption_disabled+0x48/0x280 [ 1578.880679] ? __this_cpu_preempt_check+0x1c/0x20 [ 1578.885538] ? __bpf_redirect+0x54b/0xb20 [ 1578.889715] bpf_clone_redirect+0x14a/0x490 [ 1578.894058] bpf_prog_c39d1ba309a769f7+0xb19/0x1000 [ 1578.899100] ? ctrl_getfamily+0x290/0x420 [ 1578.903266] ? lock_downgrade+0x900/0x900 [ 1578.907434] ? ktime_get+0x352/0x440 [ 1578.911172] ? find_held_lock+0x36/0x1c0 [ 1578.915251] ? lock_acquire+0x1ed/0x520 [ 1578.919234] ? bpf_test_run+0x3cb/0x780 [ 1578.923220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1578.928768] ? check_preemption_disabled+0x48/0x280 [ 1578.933807] ? kasan_check_read+0x11/0x20 [ 1578.937969] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1578.943259] ? rcu_bh_qs+0xc0/0xc0 [ 1578.946805] ? bpf_cgroup_storage_release+0x220/0x220 [ 1578.952010] ? skb_try_coalesce+0x1b70/0x1b70 [ 1578.956528] ? bpf_test_run+0x25d/0x780 [ 1578.960527] ? netlink_diag_dump+0x2a0/0x2a0 [ 1578.964950] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1578.970497] ? bpf_test_init.isra.10+0x70/0x100 [ 1578.975183] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1578.979968] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1578.984825] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1578.990371] ? fput+0x130/0x1a0 [ 1578.993666] ? __bpf_prog_get+0x9b/0x290 [ 1578.997749] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1579.002609] ? bpf_prog_test_run+0x130/0x1a0 [ 1579.007035] ? __x64_sys_bpf+0x3d8/0x520 [ 1579.011120] ? bpf_prog_get+0x20/0x20 [ 1579.014958] ? do_syscall_64+0x1b9/0x820 [ 1579.019028] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 23:26:43 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1579.024406] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1579.029349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.034205] ? trace_hardirqs_on_caller+0x310/0x310 [ 1579.039237] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1579.044266] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1579.049312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.054182] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:43 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x57}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:43 executing program 4 (fault-call:6 fault-nth:7): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x157}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x637}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2a5}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:43 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:43 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:43 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x870}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x618}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:43 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xac}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:44 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1579.577620] FAULT_INJECTION: forcing a failure. [ 1579.577620] name failslab, interval 1, probability 0, space 0, times 0 [ 1579.588967] CPU: 0 PID: 1096 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1579.596258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1579.605636] Call Trace: [ 1579.608244] dump_stack+0x1c4/0x2b6 [ 1579.611893] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1579.617118] ? __lock_is_held+0xb5/0x140 [ 1579.621209] should_fail.cold.4+0xa/0x17 [ 1579.625303] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1579.630425] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1579.630448] ? kasan_unpoison_shadow+0x35/0x50 [ 1579.630468] ? skb_tx_error+0x2f0/0x2f0 [ 1579.644302] ? __kmalloc_node_track_caller+0x47/0x70 [ 1579.649796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1579.655373] ? print_usage_bug+0xc0/0xc0 [ 1579.659451] ? kasan_check_write+0x14/0x20 [ 1579.663696] ? pskb_expand_head+0x6b3/0x10f0 [ 1579.668133] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1579.672642] ? __lock_acquire+0x7ec/0x4ec0 [ 1579.676905] __should_failslab+0x124/0x180 [ 1579.681168] should_failslab+0x9/0x14 [ 1579.684987] kmem_cache_alloc+0x47/0x730 [ 1579.689078] skb_clone+0x1bb/0x500 [ 1579.692631] ? skb_split+0x11e0/0x11e0 [ 1579.696535] ? check_preemption_disabled+0x48/0x280 [ 1579.701564] ? __this_cpu_preempt_check+0x1c/0x20 [ 1579.706466] ? __bpf_redirect+0x54b/0xb20 [ 1579.710639] bpf_clone_redirect+0xb9/0x490 [ 1579.714892] bpf_prog_c39d1ba309a769f7+0xc8/0x1000 [ 1579.719835] ? ctrl_getfamily+0x290/0x420 [ 1579.723998] ? lock_downgrade+0x900/0x900 [ 1579.728154] ? ktime_get+0x352/0x440 [ 1579.731894] ? find_held_lock+0x36/0x1c0 [ 1579.735976] ? lock_acquire+0x1ed/0x520 [ 1579.739958] ? bpf_test_run+0x3cb/0x780 [ 1579.743948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1579.749512] ? check_preemption_disabled+0x48/0x280 [ 1579.754543] ? kasan_check_read+0x11/0x20 [ 1579.758702] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1579.763991] ? rcu_bh_qs+0xc0/0xc0 [ 1579.767544] ? bpf_cgroup_storage_release+0x220/0x220 [ 1579.772744] ? skb_try_coalesce+0x1b70/0x1b70 [ 1579.777258] ? bpf_test_run+0x25d/0x780 [ 1579.781256] ? netlink_diag_dump+0x2a0/0x2a0 [ 1579.785682] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1579.791230] ? bpf_test_init.isra.10+0x70/0x100 [ 1579.795922] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1579.800706] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1579.805565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1579.811120] ? fput+0x130/0x1a0 [ 1579.814410] ? __bpf_prog_get+0x9b/0x290 [ 1579.818483] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1579.823336] ? bpf_prog_test_run+0x130/0x1a0 [ 1579.827759] ? __x64_sys_bpf+0x3d8/0x520 [ 1579.831834] ? bpf_prog_get+0x20/0x20 [ 1579.835670] ? do_syscall_64+0x1b9/0x820 [ 1579.839748] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1579.845125] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1579.850097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.854957] ? trace_hardirqs_on_caller+0x310/0x310 [ 1579.859988] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1579.865020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1579.870052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1579.874933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:44 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:44 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5c3}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:44 executing program 4 (fault-call:6 fault-nth:8): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5bf}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1580.155396] FAULT_INJECTION: forcing a failure. [ 1580.155396] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.166924] CPU: 1 PID: 1133 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1580.174213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1580.183578] Call Trace: [ 1580.186189] dump_stack+0x1c4/0x2b6 [ 1580.189841] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1580.195048] ? find_held_lock+0x36/0x1c0 [ 1580.199156] should_fail.cold.4+0xa/0x17 [ 1580.203240] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1580.208361] ? find_held_lock+0x36/0x1c0 [ 1580.212451] ? is_bpf_text_address+0xac/0x170 [ 1580.216977] ? lock_downgrade+0x900/0x900 [ 1580.221136] ? check_preemption_disabled+0x48/0x280 [ 1580.226167] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1580.231970] ? kasan_check_read+0x11/0x20 [ 1580.236131] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1580.241416] ? rcu_bh_qs+0xc0/0xc0 [ 1580.244962] ? rcu_bh_qs+0xc0/0xc0 [ 1580.248507] ? unwind_dump+0x190/0x190 [ 1580.252417] ? is_bpf_text_address+0xd3/0x170 [ 1580.256919] ? kernel_text_address+0x79/0xf0 [ 1580.261333] ? __kernel_text_address+0xd/0x40 [ 1580.265834] ? unwind_get_return_address+0x61/0xa0 [ 1580.270803] ? __save_stack_trace+0x8d/0xf0 [ 1580.275138] __should_failslab+0x124/0x180 [ 1580.279386] should_failslab+0x9/0x14 [ 1580.283193] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1580.288220] ? save_stack+0xa9/0xd0 [ 1580.291854] ? save_stack+0x43/0xd0 [ 1580.295509] __kmalloc_node_track_caller+0x33/0x70 [ 1580.300462] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1580.305230] pskb_expand_head+0x230/0x10f0 [ 1580.309471] ? memcpy+0x45/0x50 [ 1580.312756] ? __copy_skb_header+0x350/0x6b0 [ 1580.317171] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1580.321682] ? skb_checksum+0x140/0x140 [ 1580.325678] ? __lock_is_held+0xb5/0x140 [ 1580.329754] ? kasan_check_write+0x14/0x20 [ 1580.333992] ? __skb_clone+0x6c7/0xa00 [ 1580.337888] ? __copy_skb_header+0x6b0/0x6b0 [ 1580.342298] ? kmem_cache_alloc+0x33a/0x730 [ 1580.346626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1580.352177] skb_ensure_writable+0x3dd/0x640 [ 1580.356600] ? skb_cow_data+0xf10/0xf10 [ 1580.360582] ? check_preemption_disabled+0x48/0x280 [ 1580.365610] ? __this_cpu_preempt_check+0x1c/0x20 [ 1580.370458] ? __bpf_redirect+0x54b/0xb20 [ 1580.374622] bpf_clone_redirect+0x14a/0x490 [ 1580.378960] bpf_prog_c39d1ba309a769f7+0xf22/0x1000 [ 1580.383986] ? __sched_text_start+0x8/0x8 [ 1580.388141] ? ktime_get+0x352/0x440 [ 1580.391870] ? find_held_lock+0x36/0x1c0 [ 1580.395946] ? lock_acquire+0x1ed/0x520 [ 1580.399928] ? bpf_test_run+0x3cb/0x780 [ 1580.403910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1580.409455] ? check_preemption_disabled+0x48/0x280 [ 1580.414485] ? kasan_check_read+0x11/0x20 [ 1580.418641] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1580.423939] ? rcu_bh_qs+0xc0/0xc0 [ 1580.427504] ? preempt_schedule+0x4d/0x60 [ 1580.431657] ? ___preempt_schedule+0x16/0x18 [ 1580.436097] ? bpf_test_run+0x25d/0x780 [ 1580.440100] ? netlink_diag_dump+0x2a0/0x2a0 [ 1580.444521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1580.450062] ? bpf_test_init.isra.10+0x70/0x100 [ 1580.454754] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1580.459523] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1580.464402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1580.469947] ? fput+0x130/0x1a0 [ 1580.473253] ? __bpf_prog_get+0x9b/0x290 [ 1580.477323] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1580.482167] ? bpf_prog_test_run+0x130/0x1a0 [ 1580.486590] ? __x64_sys_bpf+0x3d8/0x520 [ 1580.490659] ? bpf_prog_get+0x20/0x20 [ 1580.494491] ? do_syscall_64+0x1b9/0x820 [ 1580.498559] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 23:26:44 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1580.503939] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1580.508870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1580.513719] ? trace_hardirqs_on_caller+0x310/0x310 [ 1580.518742] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1580.523770] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1580.528807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1580.533671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:45 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x873}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x804}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x158}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:45 executing program 4 (fault-call:6 fault-nth:9): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:45 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x701}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1580.890853] FAULT_INJECTION: forcing a failure. [ 1580.890853] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.902220] CPU: 1 PID: 1171 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1580.909514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1580.918884] Call Trace: [ 1580.921508] dump_stack+0x1c4/0x2b6 [ 1580.925161] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1580.930373] ? __lock_is_held+0xb5/0x140 [ 1580.934464] should_fail.cold.4+0xa/0x17 [ 1580.938554] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1580.943685] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1580.948985] ? kasan_unpoison_shadow+0x35/0x50 [ 1580.953592] ? skb_tx_error+0x2f0/0x2f0 [ 1580.957587] ? __kmalloc_node_track_caller+0x47/0x70 [ 1580.962707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1580.968258] ? print_usage_bug+0xc0/0xc0 [ 1580.972335] ? kasan_check_write+0x14/0x20 [ 1580.976590] ? pskb_expand_head+0x6b3/0x10f0 [ 1580.981026] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1580.985553] ? __lock_acquire+0x7ec/0x4ec0 [ 1580.989820] __should_failslab+0x124/0x180 [ 1580.994090] should_failslab+0x9/0x14 [ 1580.997906] kmem_cache_alloc+0x47/0x730 [ 1581.001989] skb_clone+0x1bb/0x500 [ 1581.005546] ? skb_split+0x11e0/0x11e0 [ 1581.009447] ? check_preemption_disabled+0x48/0x280 [ 1581.014500] ? __this_cpu_preempt_check+0x1c/0x20 [ 1581.019360] ? __bpf_redirect+0x54b/0xb20 [ 1581.023538] bpf_clone_redirect+0xb9/0x490 [ 1581.027798] bpf_prog_c39d1ba309a769f7+0x9cb/0x1000 [ 1581.032820] ? ctrl_getfamily+0x290/0x420 [ 1581.036979] ? lock_downgrade+0x900/0x900 [ 1581.041135] ? ktime_get+0x352/0x440 [ 1581.044888] ? find_held_lock+0x36/0x1c0 [ 1581.048965] ? lock_acquire+0x1ed/0x520 [ 1581.052945] ? bpf_test_run+0x3cb/0x780 [ 1581.056932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1581.062481] ? check_preemption_disabled+0x48/0x280 [ 1581.067543] ? kasan_check_read+0x11/0x20 [ 1581.071717] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1581.077016] ? rcu_bh_qs+0xc0/0xc0 [ 1581.080567] ? bpf_cgroup_storage_release+0x220/0x220 [ 1581.085766] ? skb_try_coalesce+0x1b70/0x1b70 [ 1581.090294] ? bpf_test_run+0x25d/0x780 [ 1581.094305] ? netlink_diag_dump+0x2a0/0x2a0 [ 1581.098728] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1581.104277] ? bpf_test_init.isra.10+0x70/0x100 [ 1581.108963] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1581.113737] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1581.118589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1581.124136] ? fput+0x130/0x1a0 [ 1581.127428] ? __bpf_prog_get+0x9b/0x290 [ 1581.131504] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1581.136352] ? bpf_prog_test_run+0x130/0x1a0 [ 1581.140778] ? __x64_sys_bpf+0x3d8/0x520 [ 1581.144847] ? bpf_prog_get+0x20/0x20 [ 1581.148686] ? do_syscall_64+0x1b9/0x820 [ 1581.152761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1581.158138] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1581.163085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1581.167940] ? trace_hardirqs_on_caller+0x310/0x310 [ 1581.172970] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1581.177999] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1581.183031] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:45 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xd1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:45 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1581.187898] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x37c}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x70d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:45 executing program 4 (fault-call:6 fault-nth:10): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:45 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x8ea}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:45 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1d8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) [ 1581.587337] FAULT_INJECTION: forcing a failure. [ 1581.587337] name failslab, interval 1, probability 0, space 0, times 0 [ 1581.598663] CPU: 1 PID: 1215 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1581.605977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1581.615342] Call Trace: [ 1581.617953] dump_stack+0x1c4/0x2b6 [ 1581.621603] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1581.626813] ? find_held_lock+0x36/0x1c0 [ 1581.630901] should_fail.cold.4+0xa/0x17 [ 1581.634980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1581.640105] ? find_held_lock+0x36/0x1c0 [ 1581.644190] ? is_bpf_text_address+0xac/0x170 [ 1581.648953] ? lock_downgrade+0x900/0x900 [ 1581.653119] ? check_preemption_disabled+0x48/0x280 [ 1581.658154] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1581.663959] ? kasan_check_read+0x11/0x20 [ 1581.668117] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1581.673403] ? rcu_bh_qs+0xc0/0xc0 [ 1581.676957] ? rcu_bh_qs+0xc0/0xc0 [ 1581.680506] ? unwind_dump+0x190/0x190 [ 1581.684415] ? is_bpf_text_address+0xd3/0x170 [ 1581.688926] ? kernel_text_address+0x79/0xf0 [ 1581.693353] ? __kernel_text_address+0xd/0x40 [ 1581.697863] ? unwind_get_return_address+0x61/0xa0 [ 1581.702830] ? __save_stack_trace+0x8d/0xf0 [ 1581.707168] __should_failslab+0x124/0x180 [ 1581.711416] should_failslab+0x9/0x14 [ 1581.715441] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1581.720467] ? save_stack+0xa9/0xd0 [ 1581.724113] ? save_stack+0x43/0xd0 [ 1581.727760] __kmalloc_node_track_caller+0x33/0x70 [ 1581.732706] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1581.737481] pskb_expand_head+0x230/0x10f0 [ 1581.741729] ? memcpy+0x45/0x50 [ 1581.745022] ? __copy_skb_header+0x350/0x6b0 [ 1581.749440] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1581.753950] ? skb_checksum+0x140/0x140 [ 1581.757945] ? __lock_is_held+0xb5/0x140 [ 1581.762024] ? kasan_check_write+0x14/0x20 [ 1581.766267] ? __skb_clone+0x6c7/0xa00 [ 1581.770167] ? __copy_skb_header+0x6b0/0x6b0 [ 1581.774586] ? kmem_cache_alloc+0x33a/0x730 [ 1581.778927] skb_ensure_writable+0x3dd/0x640 [ 1581.783347] ? skb_cow_data+0xf10/0xf10 [ 1581.787332] ? check_preemption_disabled+0x48/0x280 [ 1581.792368] ? __this_cpu_preempt_check+0x1c/0x20 [ 1581.797222] ? __bpf_redirect+0x54b/0xb20 [ 1581.801412] bpf_clone_redirect+0x14a/0x490 [ 1581.805759] bpf_prog_c39d1ba309a769f7+0x65b/0x1000 [ 1581.810808] ? ctrl_getfamily+0x290/0x420 [ 1581.814968] ? lock_downgrade+0x900/0x900 [ 1581.819141] ? ktime_get+0x352/0x440 [ 1581.822890] ? find_held_lock+0x36/0x1c0 [ 1581.826977] ? lock_acquire+0x1ed/0x520 [ 1581.830970] ? bpf_test_run+0x3cb/0x780 [ 1581.834960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1581.840507] ? check_preemption_disabled+0x48/0x280 [ 1581.845541] ? kasan_check_read+0x11/0x20 [ 1581.849705] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1581.855006] ? rcu_bh_qs+0xc0/0xc0 [ 1581.858559] ? bpf_cgroup_storage_release+0x220/0x220 [ 1581.863760] ? skb_try_coalesce+0x1b70/0x1b70 [ 1581.868278] ? bpf_test_run+0x25d/0x780 [ 1581.872273] ? netlink_diag_dump+0x2a0/0x2a0 [ 1581.876699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1581.882243] ? bpf_test_init.isra.10+0x70/0x100 [ 1581.886929] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1581.891708] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1581.896560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1581.902118] ? fput+0x130/0x1a0 [ 1581.905410] ? __bpf_prog_get+0x9b/0x290 [ 1581.909486] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1581.914335] ? bpf_prog_test_run+0x130/0x1a0 [ 1581.918764] ? __x64_sys_bpf+0x3d8/0x520 [ 1581.922840] ? bpf_prog_get+0x20/0x20 [ 1581.926682] ? do_syscall_64+0x1b9/0x820 [ 1581.930755] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 23:26:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x14c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:46 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1581.936132] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1581.941080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1581.945953] ? trace_hardirqs_on_caller+0x310/0x310 [ 1581.950983] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1581.956015] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1581.961049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1581.965924] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:46 executing program 4 (fault-call:6 fault-nth:11): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x51}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:46 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:46 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3cc}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:46 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7e7}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) [ 1582.264334] FAULT_INJECTION: forcing a failure. [ 1582.264334] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.275799] CPU: 0 PID: 1249 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1582.283094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1582.292454] Call Trace: [ 1582.295090] dump_stack+0x1c4/0x2b6 [ 1582.298740] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1582.303953] ? __lock_is_held+0xb5/0x140 [ 1582.308039] should_fail.cold.4+0xa/0x17 [ 1582.312128] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1582.317244] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1582.322535] ? kasan_unpoison_shadow+0x35/0x50 [ 1582.327135] ? skb_tx_error+0x2f0/0x2f0 [ 1582.331134] ? __kmalloc_node_track_caller+0x47/0x70 [ 1582.336271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1582.341820] ? print_usage_bug+0xc0/0xc0 [ 1582.345891] ? kasan_check_write+0x14/0x20 [ 1582.350134] ? pskb_expand_head+0x6b3/0x10f0 [ 1582.354569] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1582.359087] ? __lock_acquire+0x7ec/0x4ec0 [ 1582.363352] __should_failslab+0x124/0x180 [ 1582.367600] should_failslab+0x9/0x14 [ 1582.371422] kmem_cache_alloc+0x47/0x730 [ 1582.375497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1582.381065] skb_clone+0x1bb/0x500 [ 1582.384630] ? skb_split+0x11e0/0x11e0 [ 1582.388532] ? check_preemption_disabled+0x48/0x280 [ 1582.393565] ? __this_cpu_preempt_check+0x1c/0x20 [ 1582.398418] ? __bpf_redirect+0x54b/0xb20 [ 1582.402589] bpf_clone_redirect+0xb9/0x490 [ 1582.406842] bpf_prog_c39d1ba309a769f7+0xe42/0x1000 [ 1582.411871] ? __sched_text_start+0x8/0x8 [ 1582.416026] ? ktime_get+0x352/0x440 [ 1582.419765] ? find_held_lock+0x36/0x1c0 [ 1582.423856] ? lock_acquire+0x1ed/0x520 [ 1582.427837] ? bpf_test_run+0x3cb/0x780 [ 1582.431822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1582.437374] ? check_preemption_disabled+0x48/0x280 [ 1582.442408] ? kasan_check_read+0x11/0x20 [ 1582.446569] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1582.451858] ? rcu_bh_qs+0xc0/0xc0 [ 1582.455409] ? preempt_schedule+0x4d/0x60 [ 1582.459578] ? ___preempt_schedule+0x16/0x18 [ 1582.464005] ? bpf_test_run+0x25d/0x780 [ 1582.468000] ? netlink_diag_dump+0x2a0/0x2a0 [ 1582.472423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1582.477969] ? bpf_test_init.isra.10+0x70/0x100 [ 1582.482652] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1582.487436] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1582.492290] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1582.497839] ? fput+0x130/0x1a0 [ 1582.501133] ? __bpf_prog_get+0x9b/0x290 [ 1582.505212] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1582.510062] ? bpf_prog_test_run+0x130/0x1a0 [ 1582.514490] ? __x64_sys_bpf+0x3d8/0x520 [ 1582.518565] ? bpf_prog_get+0x20/0x20 [ 1582.522394] ? do_syscall_64+0x1b9/0x820 [ 1582.526500] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1582.531881] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1582.536823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1582.541693] ? trace_hardirqs_on_caller+0x310/0x310 [ 1582.546723] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1582.551754] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1582.556788] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x991}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1582.561656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:47 executing program 4 (fault-call:6 fault-nth:12): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:47 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x567}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:47 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x17f}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x697}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1582.890085] FAULT_INJECTION: forcing a failure. [ 1582.890085] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.901461] CPU: 0 PID: 1278 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1582.908752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1582.918119] Call Trace: [ 1582.920732] dump_stack+0x1c4/0x2b6 [ 1582.924428] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1582.929646] ? find_held_lock+0x36/0x1c0 [ 1582.933741] should_fail.cold.4+0xa/0x17 [ 1582.937823] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1582.942937] ? find_held_lock+0x36/0x1c0 [ 1582.947015] ? is_bpf_text_address+0xac/0x170 [ 1582.951520] ? lock_downgrade+0x900/0x900 [ 1582.955677] ? check_preemption_disabled+0x48/0x280 [ 1582.960705] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1582.966518] ? kasan_check_read+0x11/0x20 [ 1582.970672] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1582.975955] ? rcu_bh_qs+0xc0/0xc0 [ 1582.979501] ? rcu_bh_qs+0xc0/0xc0 [ 1582.983045] ? unwind_dump+0x190/0x190 [ 1582.986956] ? is_bpf_text_address+0xd3/0x170 [ 1582.991460] ? kernel_text_address+0x79/0xf0 [ 1582.995880] ? __kernel_text_address+0xd/0x40 [ 1583.000380] ? unwind_get_return_address+0x61/0xa0 [ 1583.005320] ? __save_stack_trace+0x8d/0xf0 [ 1583.009656] __should_failslab+0x124/0x180 [ 1583.013903] should_failslab+0x9/0x14 [ 1583.017710] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1583.022765] ? save_stack+0xa9/0xd0 [ 1583.026403] ? save_stack+0x43/0xd0 [ 1583.030047] __kmalloc_node_track_caller+0x33/0x70 [ 1583.035000] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1583.039768] pskb_expand_head+0x230/0x10f0 [ 1583.044015] ? memcpy+0x45/0x50 [ 1583.047301] ? __copy_skb_header+0x350/0x6b0 [ 1583.051729] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1583.056233] ? skb_checksum+0x140/0x140 [ 1583.060221] ? __lock_is_held+0xb5/0x140 [ 1583.064296] ? kasan_check_write+0x14/0x20 [ 1583.068533] ? __skb_clone+0x6c7/0xa00 [ 1583.072430] ? __copy_skb_header+0x6b0/0x6b0 [ 1583.076841] ? kmem_cache_alloc+0x33a/0x730 [ 1583.081185] skb_ensure_writable+0x3dd/0x640 [ 1583.085603] ? skb_cow_data+0xf10/0xf10 [ 1583.089583] ? check_preemption_disabled+0x48/0x280 [ 1583.094610] ? __this_cpu_preempt_check+0x1c/0x20 [ 1583.099463] ? __bpf_redirect+0x54b/0xb20 [ 1583.103632] bpf_clone_redirect+0x14a/0x490 [ 1583.107970] bpf_prog_c39d1ba309a769f7+0xeb6/0x1000 [ 1583.112989] ? ctrl_getfamily+0x290/0x420 [ 1583.117149] ? lock_downgrade+0x900/0x900 [ 1583.121307] ? ktime_get+0x352/0x440 [ 1583.125046] ? find_held_lock+0x36/0x1c0 [ 1583.129142] ? lock_acquire+0x1ed/0x520 [ 1583.133139] ? bpf_test_run+0x3cb/0x780 [ 1583.137128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1583.142676] ? check_preemption_disabled+0x48/0x280 [ 1583.147710] ? kasan_check_read+0x11/0x20 [ 1583.151878] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1583.157162] ? rcu_bh_qs+0xc0/0xc0 [ 1583.160708] ? bpf_cgroup_storage_release+0x220/0x220 [ 1583.165909] ? skb_try_coalesce+0x1b70/0x1b70 [ 1583.170421] ? bpf_test_run+0x25d/0x780 [ 1583.174415] ? netlink_diag_dump+0x2a0/0x2a0 [ 1583.178830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1583.184370] ? bpf_test_init.isra.10+0x70/0x100 [ 1583.189049] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1583.193838] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1583.198683] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1583.204229] ? fput+0x130/0x1a0 [ 1583.207514] ? __bpf_prog_get+0x9b/0x290 [ 1583.211585] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1583.216430] ? bpf_prog_test_run+0x130/0x1a0 [ 1583.220872] ? __x64_sys_bpf+0x3d8/0x520 [ 1583.224936] ? bpf_prog_get+0x20/0x20 [ 1583.228766] ? do_syscall_64+0x1b9/0x820 [ 1583.232836] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1583.238211] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1583.243146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1583.248004] ? trace_hardirqs_on_caller+0x310/0x310 [ 1583.253024] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1583.258048] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1583.263091] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1583.267950] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:47 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:47 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:47 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x415}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:47 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x381}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x757}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:48 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:48 executing program 4 (fault-call:6 fault-nth:13): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:48 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x417}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x43}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) [ 1583.793304] FAULT_INJECTION: forcing a failure. [ 1583.793304] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.804818] CPU: 1 PID: 1345 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1583.812111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1583.821470] Call Trace: [ 1583.824093] dump_stack+0x1c4/0x2b6 [ 1583.827765] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1583.832983] ? __lock_is_held+0xb5/0x140 [ 1583.837064] should_fail.cold.4+0xa/0x17 [ 1583.841154] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1583.846280] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1583.851576] ? kasan_unpoison_shadow+0x35/0x50 [ 1583.856178] ? skb_tx_error+0x2f0/0x2f0 [ 1583.860170] ? __kmalloc_node_track_caller+0x47/0x70 [ 1583.865290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1583.870833] ? print_usage_bug+0xc0/0xc0 [ 1583.874920] ? kasan_check_write+0x14/0x20 [ 1583.879164] ? pskb_expand_head+0x6b3/0x10f0 [ 1583.883596] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1583.888110] ? __lock_acquire+0x7ec/0x4ec0 [ 1583.892366] __should_failslab+0x124/0x180 [ 1583.896614] should_failslab+0x9/0x14 [ 1583.900431] kmem_cache_alloc+0x47/0x730 [ 1583.904508] skb_clone+0x1bb/0x500 [ 1583.908056] ? skb_split+0x11e0/0x11e0 [ 1583.911972] ? check_preemption_disabled+0x48/0x280 [ 1583.917001] ? __this_cpu_preempt_check+0x1c/0x20 [ 1583.921872] ? __bpf_redirect+0x54b/0xb20 [ 1583.926043] bpf_clone_redirect+0xb9/0x490 [ 1583.930298] bpf_prog_c39d1ba309a769f7+0xe5f/0x1000 [ 1583.935322] ? ctrl_getfamily+0x290/0x420 [ 1583.939494] ? lock_downgrade+0x900/0x900 [ 1583.943647] ? ktime_get+0x352/0x440 [ 1583.947384] ? find_held_lock+0x36/0x1c0 [ 1583.951458] ? lock_acquire+0x1ed/0x520 [ 1583.955441] ? bpf_test_run+0x3cb/0x780 [ 1583.959420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1583.964964] ? check_preemption_disabled+0x48/0x280 [ 1583.969990] ? kasan_check_read+0x11/0x20 [ 1583.974146] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1583.979426] ? rcu_bh_qs+0xc0/0xc0 [ 1583.982971] ? bpf_cgroup_storage_release+0x220/0x220 [ 1583.988170] ? skb_try_coalesce+0x1b70/0x1b70 [ 1583.992684] ? bpf_test_run+0x25d/0x780 [ 1583.996688] ? netlink_diag_dump+0x2a0/0x2a0 [ 1584.001115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1584.006682] ? bpf_test_init.isra.10+0x70/0x100 [ 1584.011361] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1584.016145] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1584.020991] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1584.026542] ? fput+0x130/0x1a0 [ 1584.029859] ? __bpf_prog_get+0x9b/0x290 [ 1584.033926] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1584.038773] ? bpf_prog_test_run+0x130/0x1a0 [ 1584.043189] ? __x64_sys_bpf+0x3d8/0x520 [ 1584.047259] ? bpf_prog_get+0x20/0x20 [ 1584.051093] ? do_syscall_64+0x1b9/0x820 [ 1584.055164] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1584.060534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1584.065480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1584.070328] ? trace_hardirqs_on_caller+0x310/0x310 [ 1584.075354] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1584.080379] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1584.085410] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:48 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:48 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) [ 1584.090270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x95e}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5ed}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:48 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:48 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x235}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:48 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:48 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x329}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:49 executing program 4 (fault-call:6 fault-nth:14): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:49 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x898}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:49 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x48) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3e1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:49 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7d3}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x19d}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1584.687914] FAULT_INJECTION: forcing a failure. [ 1584.687914] name failslab, interval 1, probability 0, space 0, times 0 [ 1584.699238] CPU: 0 PID: 1416 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1584.706530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1584.716107] Call Trace: [ 1584.718714] dump_stack+0x1c4/0x2b6 [ 1584.722372] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1584.727583] ? find_held_lock+0x36/0x1c0 [ 1584.731680] should_fail.cold.4+0xa/0x17 [ 1584.735765] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1584.740892] ? find_held_lock+0x36/0x1c0 [ 1584.744984] ? is_bpf_text_address+0xac/0x170 [ 1584.749507] ? lock_downgrade+0x900/0x900 [ 1584.753673] ? check_preemption_disabled+0x48/0x280 [ 1584.758710] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1584.764526] ? kasan_check_read+0x11/0x20 [ 1584.768694] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1584.773992] ? rcu_bh_qs+0xc0/0xc0 [ 1584.777648] ? rcu_bh_qs+0xc0/0xc0 [ 1584.781197] ? unwind_dump+0x190/0x190 [ 1584.785123] ? is_bpf_text_address+0xd3/0x170 [ 1584.789651] ? kernel_text_address+0x79/0xf0 [ 1584.794087] ? __kernel_text_address+0xd/0x40 [ 1584.798597] ? unwind_get_return_address+0x61/0xa0 [ 1584.803543] ? __save_stack_trace+0x8d/0xf0 [ 1584.807896] __should_failslab+0x124/0x180 [ 1584.812149] should_failslab+0x9/0x14 [ 1584.815966] kmem_cache_alloc_node_trace+0x5a/0x740 [ 1584.820993] ? save_stack+0xa9/0xd0 [ 1584.824634] ? save_stack+0x43/0xd0 [ 1584.828300] __kmalloc_node_track_caller+0x33/0x70 [ 1584.833249] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1584.838030] pskb_expand_head+0x230/0x10f0 [ 1584.842284] ? memcpy+0x45/0x50 [ 1584.845579] ? __copy_skb_header+0x350/0x6b0 [ 1584.850016] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1584.854538] ? skb_checksum+0x140/0x140 [ 1584.858529] ? __lock_is_held+0xb5/0x140 [ 1584.862609] ? kasan_check_write+0x14/0x20 [ 1584.866854] ? __skb_clone+0x6c7/0xa00 [ 1584.870754] ? __copy_skb_header+0x6b0/0x6b0 [ 1584.875173] ? kmem_cache_alloc+0x33a/0x730 [ 1584.879521] skb_ensure_writable+0x3dd/0x640 [ 1584.883943] ? skb_cow_data+0xf10/0xf10 [ 1584.887927] ? check_preemption_disabled+0x48/0x280 [ 1584.892958] ? __this_cpu_preempt_check+0x1c/0x20 [ 1584.897817] ? __bpf_redirect+0x54b/0xb20 [ 1584.901994] bpf_clone_redirect+0x14a/0x490 [ 1584.906335] bpf_prog_c39d1ba309a769f7+0x7e/0x1000 [ 1584.911276] ? ctrl_getfamily+0x290/0x420 [ 1584.915442] ? lock_downgrade+0x900/0x900 [ 1584.919604] ? ktime_get+0x352/0x440 [ 1584.923340] ? find_held_lock+0x36/0x1c0 [ 1584.927422] ? lock_acquire+0x1ed/0x520 [ 1584.931409] ? bpf_test_run+0x3cb/0x780 [ 1584.935402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1584.940957] ? check_preemption_disabled+0x48/0x280 [ 1584.945998] ? kasan_check_read+0x11/0x20 [ 1584.950160] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1584.955455] ? rcu_bh_qs+0xc0/0xc0 [ 1584.959007] ? bpf_cgroup_storage_release+0x220/0x220 [ 1584.964212] ? skb_try_coalesce+0x1b70/0x1b70 [ 1584.968730] ? bpf_test_run+0x25d/0x780 [ 1584.972731] ? netlink_diag_dump+0x2a0/0x2a0 [ 1584.977154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1584.982708] ? bpf_test_init.isra.10+0x70/0x100 [ 1584.987394] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1584.992169] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1584.997026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1585.002574] ? fput+0x130/0x1a0 [ 1585.005868] ? __bpf_prog_get+0x9b/0x290 [ 1585.009939] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1585.014805] ? bpf_prog_test_run+0x130/0x1a0 [ 1585.019228] ? __x64_sys_bpf+0x3d8/0x520 [ 1585.023296] ? bpf_prog_get+0x20/0x20 [ 1585.027139] ? do_syscall_64+0x1b9/0x820 [ 1585.031216] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1585.036589] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1585.041528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1585.046382] ? trace_hardirqs_on_caller+0x310/0x310 [ 1585.051415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1585.056484] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1585.061528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1585.066392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:49 executing program 4 (fault-call:6 fault-nth:15): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:49 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:49 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x200000e8) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x690}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:49 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x549}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) [ 1585.281241] FAULT_INJECTION: forcing a failure. [ 1585.281241] name failslab, interval 1, probability 0, space 0, times 0 [ 1585.292611] CPU: 1 PID: 1448 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1585.299909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1585.309262] Call Trace: [ 1585.311867] dump_stack+0x1c4/0x2b6 [ 1585.315510] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1585.320714] ? __lock_is_held+0xb5/0x140 [ 1585.324789] should_fail.cold.4+0xa/0x17 [ 1585.328863] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1585.333978] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1585.339268] ? kasan_unpoison_shadow+0x35/0x50 [ 1585.343866] ? skb_tx_error+0x2f0/0x2f0 [ 1585.347858] ? __kmalloc_node_track_caller+0x47/0x70 [ 1585.352967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1585.358516] ? print_usage_bug+0xc0/0xc0 [ 1585.362586] ? kasan_check_write+0x14/0x20 [ 1585.366828] ? pskb_expand_head+0x6b3/0x10f0 [ 1585.371257] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1585.375785] ? __lock_acquire+0x7ec/0x4ec0 [ 1585.380044] __should_failslab+0x124/0x180 [ 1585.384303] should_failslab+0x9/0x14 [ 1585.388116] kmem_cache_alloc+0x47/0x730 [ 1585.392189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1585.397743] skb_clone+0x1bb/0x500 [ 1585.401295] ? skb_split+0x11e0/0x11e0 [ 1585.405194] ? check_preemption_disabled+0x48/0x280 [ 1585.410225] ? __this_cpu_preempt_check+0x1c/0x20 [ 1585.415082] ? __bpf_redirect+0x54b/0xb20 [ 1585.419249] bpf_clone_redirect+0xb9/0x490 [ 1585.423498] bpf_prog_c39d1ba309a769f7+0x4e6/0x1000 [ 1585.428526] ? __sched_text_start+0x8/0x8 [ 1585.432691] ? ktime_get+0x352/0x440 [ 1585.436427] ? find_held_lock+0x36/0x1c0 [ 1585.440516] ? lock_acquire+0x1ed/0x520 [ 1585.444495] ? bpf_test_run+0x3cb/0x780 [ 1585.448474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1585.454026] ? check_preemption_disabled+0x48/0x280 [ 1585.459053] ? kasan_check_read+0x11/0x20 [ 1585.463226] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1585.468530] ? rcu_bh_qs+0xc0/0xc0 [ 1585.472095] ? preempt_schedule+0x4d/0x60 [ 1585.476257] ? ___preempt_schedule+0x16/0x18 [ 1585.480686] ? bpf_test_run+0x25d/0x780 [ 1585.484692] ? netlink_diag_dump+0x2a0/0x2a0 [ 1585.489144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1585.494693] ? bpf_test_init.isra.10+0x70/0x100 [ 1585.499373] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1585.504144] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1585.509005] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1585.514569] ? fput+0x130/0x1a0 [ 1585.517859] ? __bpf_prog_get+0x9b/0x290 [ 1585.521931] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1585.526779] ? bpf_prog_test_run+0x130/0x1a0 [ 1585.531207] ? __x64_sys_bpf+0x3d8/0x520 [ 1585.535276] ? bpf_prog_get+0x20/0x20 [ 1585.539110] ? do_syscall_64+0x1b9/0x820 [ 1585.543178] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1585.548552] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1585.553487] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1585.558340] ? trace_hardirqs_on_caller+0x310/0x310 [ 1585.563362] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1585.568384] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1585.573413] ? trace_hardirqs_off_thunk+0x1a/0x1c 23:26:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x588}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) [ 1585.578275] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:50 executing program 4 (fault-call:6 fault-nth:16): socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x47e}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:50 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5b4}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:50 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r0) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6fd}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3aa}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:50 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:50 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:50 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x352}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:50 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5d8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x74e}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:50 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:50 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x85d}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:50 executing program 1: r0 = gettid() socketpair(0x10, 0x6, 0xe4, &(0x7f0000000080)={0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x6, 0x70, 0x0, 0x1, 0x8, 0xa0, 0x0, 0x5, 0x1020, 0x8, 0x5, 0x2, 0x80, 0x7, 0x9, 0x0, 0x1, 0x4, 0x0, 0x8000000000, 0x8, 0x3ff, 0x2, 0x8, 0x5, 0x6, 0x4, 0xfffffffffffffffb, 0x0, 0x5, 0x7, 0xff, 0x7, 0x80000000, 0x10000, 0x1000, 0x79, 0xab50, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x200, 0xffff, 0x9, 0x6, 0x1, 0x0, 0xfffffffffffffffc}, r0, 0x0, r1, 0x1) recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r3, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r4, 0x5, 0x8}, 0xc) 23:26:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xd5}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:51 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x506}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:51 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x48) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:51 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x4021a4856ce6234b}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff7900ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000024f71a3d00000000000000000000000000000000000000000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x10, 0x80000, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='!md5sumuser,]\x00') ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000080)=r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x5}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2ac}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:51 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x4fe}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7cc}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:51 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x200000e8) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xdc}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:51 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:51 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000be63051fa2eb3e2d7b8c657a9698aecbd8418c5f8df9f7be0000009e7997e6c4ac28d9a465040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x46}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:51 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x38e}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:51 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:51 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x69, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:51 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x77d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2b5}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:51 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7002000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:52 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x465}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x10c}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:52 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000000000000850000000d000000b70000000000000095000000000000000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:52 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r1, &(0x7f0000000280)="de41b4c80fc155456cd84852660761f6bae3e1aa8e5bf8e7a805c4d49aa9273f860104e1a1c91250a767e8d0077bd3503b233c6756c41a4239fb195985f21ab5406598ad461b9dcdd3311e0f4505e413eb2c3ff17c93638b213bfd6394eeadb50c3acec51ed3a339681f4ae224338336234fd7a873e549210c15c5b273eb022f8624fe1e5bf57b3b", &(0x7f0000000400)=""/246}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 23:26:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2f5}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:52 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x269}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:52 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) sendmsg(r1, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000400)="9d6c899d60253dabd7f76c5d55e935f2474ab58426aab07f8466f91eb33177205203775a0dcbd32324664587ecef8beff25b6dc64c6eb6c3f8a1dabd7c1b38c69da70b0d5ac6cb39a36e751661cc41f31e75c8812517b6d2dd99030f3071e57fa396fd9355c01992f4bc01e7e9", 0x6d}, {&(0x7f00000002c0)="f43f749283070bd0700b713d81795aa9c70f17deec0595beb7f771", 0x1b}, {&(0x7f0000000480)="64fae3b5d30622f8920cb32aef10fd431efedd88c01a344831a3f2a6e7f85c4c8c3feb50f202903c74c9ab72f7cf5fb492cbc6dec6b8ee9ce836cd29a1d9267589eccaca23f550eb6ea003c47a33ffe4bf015dd625a4793a6719f80e7da3a31c9a029211b0e8d0257e8c4969cc1b72262ccdf7d131db69bb0661aa5c900a441663ac359dd90304d97da5139dfb819bb22804ffe049724ed0d43f5ff8e82cba5078acdb6e208989e4c2a6bede59b03f4d54b7f80ce94bd76e3292cccdff88c61782da88293f1ec545977e24fe8097b338e9991767cc0070cfe58b0974939f1db314b7938bf794", 0xe6}, {&(0x7f0000000580)="d06506ed1f091cd8e447d37b0d7df52f1c071a2ebba22f1930b779b6fe45cb70460d725ee7a1414df4e0b8cacade2af5c920e45dc72ef0d055b327efa64e05e40a47ade40f9f05fc832b29d21437941553af762cbcc6e5de716aec1d82192ef68fd1f1a6998d4d00c4bb960487f7a81e5f4816086bf9c21e09e4ef1a97cbf2249a511b31ace47799986a2534993c09e354027ec89aac461adee6f18fa9fdd8fd53cb0165b81c7c90f1f1bc2fa9f1cb61a534af432a6aa1a35e4d80c2c2b34921ebba4d534190a19f63d0e0dea4", 0xcd}, {&(0x7f0000000680)="e19879fc1dafd22a5ecaecaa8504c826857655084566e784204611c79f4303f16e76905bd581e82b31e3ccecf3ab204f6af2029346d194d466ba0be6055fb307f136ab8eda0e950cca3fb499c77c33b928bee1d7aad6daf5b7d7c38710c5100514b48389bfb4e2356c69a839", 0x6c}], 0x5, &(0x7f0000000780)=[{0xc0, 0x107, 0x62c, "bb45666897d8c74894cdeb7f20f0c29fbb561c4264865e21b4ae36218ea58182ca0987afedad8643cd0a80f248e37a8e9d26808ab5d289372605ae17c1fb92a5094fdffd96164138148ef971b685e95d27c4d6b1d28ec7f94d284e3e11e1bcacaa7e45e50eca7c6cda8b2da5695abc14b28094606b6469aee2430f2aa2003572243bfd1b6219fa38f1f75e2aa3317580c9afc91a16b64b64946f43dca0222ffbc814400a2ad0e1065f4c5bc993b9be20"}, {0x100, 0x13f, 0x3, "2a122c3e3bc37f60af62da2e4d974a41afd5db9470e9215ac6d08f5bce27634d05d729007136afc686f5bd6a9ec159b57ee116e14d565c8f2913341a3df89e7b4cd436a8aabfc7200547f6c310414dcb0400e3449b293339fddfb4679eeac46368c33dad394b4b5f6ca08cdc56dd4f51461e37810fd5f8f6fa20e52a6e4ccee7289c45587b507654d6b6e6ff55f67f6d7523814b5854c407dec42548b493f5f4e1aebb715e59ec048104f4b6140d2cb07ccdd92ec4ac3b75e0bc220668d92e6a24f0c09caa29b3bfb37b721adb062d3386ef4f09f02e22b5b3352ce5d66ff8c30e57aa1a05b8ac6e183413ff40"}, {0x100, 0x110, 0x6, "3e5df5d146be7cc9ebbb8476edc90696da66ddb34f9c7c992a083babd4eff284e46b1bfcb61cbfef36ae1190b37f30fa5503f33fccac0ba052c117f182ae043a5c343cdbfe02d0854679fb90a8b6255047cb05ba6e0a9c2624cf5f19c12954cb0e311208db3d94a515b4850fe6e8a44f312570a86d8e7633f68fa31c5d052a6c05741d4e7837b330d207290aa6474620da0daa7daaa4df50813a51d1d6353a104d49b8f9aa75386967f35825dec7b2c1eb9ccf2659f33333b4e6b7816a118da1bd7262a3b9a2ec369cd231fe97e3b6739ae9fc23892d875a2112e5b28ee71c35de8648eba278c9f2c729c52bf9"}, {0x38, 0x116, 0xffffffffffffffc0, "7dad6b7e6ff0b68a3a3612823c4d7fc63f7632bd3deaabfc09da62abd2ec2132457899296e"}, {0xc0, 0x101, 0x4, "a73b2b3dadcf0fed0ee7fe6553edad7aea936824915962484a110b4f57d33bf0e74075f113ba96ef0e642d16423b4a5e991900381ca5732fe6f94cd778cc669246134fe18b58fcecd32cbd94ed3728d4dfe6c58960a357d2c5aaf7f5ff043bb6d981fc66cc1cce3bd9338b6adbb816f90ce551e83fecf39da3b00420df98e79d7dcccd0e877a80f402315390aebdbab786346bf43c6a7af0e6fae87b838ef7ddf7971caaf52fa35dd9012a"}, {0xc8, 0x1ff, 0x8, "af699409e14ef87955424aae2a0a0a37928ab53d2febf76e48603c4d477751f3adf6a3fc1c33fd4ed43d072b68dcddc8dcbb0c3f2bc8974a7a2f430c506181ea2620dcc6fc6913ab1a8c56363935d4971226b6bb41a77199d9dac21b8db7c03e0fc49a339138c31c72aea1bfceab5f1af4b92940625613f14ea1c688b1b87f842d6c5afe5d01b7144a559e7626e6ab0a0a4cd700271449ffbd4f4ffab67b4a81d13e47ba4a09f7180a8df7553cdfd35227c99d36c1ac0fdc"}, {0xa8, 0x111, 0x1, "0d6f6768de889c3f86e1e190f61243e56eb6bf8fe9340dc14c2be7cfb1ce4b0334445b6cec5260cd3bb97adb240ec9210b6a90e912042bd4863a3908fa5910634d1e788b2632405243b1ed97b0c6c793bc1412b4852d48fa8f931c845f451b85db42aee7a42460d63cb9622c0e2912df49c5ca550f673103baf489967a6a7f864e1daff9cdb4cee64c6041a33317f584101c005029f06e"}, {0x88, 0x0, 0x4, "986ea15eb970646002a0ed142da1ae0348bb867c4c170b42ef5b0c3e3d9c16a52fef3cc39fa493b88d18f946efa32b803646bdaa2feed94690cd38a09445120c4a1c6496bac0f03be88dfccac6695968cfa49ba7f884e1ab72b189af9e271d633318f509fd9cf61c7d8caca87f6a2f6dc524b2a2b23c"}, {0x108, 0xba, 0xe24f, "7c7b21102eb73fcc9ea277c0c8319294c0314792c4191e32f7d47319006a9425c8deacd1ed0756d6353243efb7fa30a11f3f26a42cf1da8a4e697798dcf4ab9b23aa15c89e1b960554474cd86cf16ca25baa944130f5cca6ff100dc7c548584ded5fc91f65e9b839d84380b0610d2f084df156ca3dc9c04aecc75f191afe4e48a346b117da9c13cf57e4932bd59e8d5628b8c49d4fe86566204ea4a744d7ba7a9aeb484a1bc3e91c0579d1b16f1b055be91fc2fb99685ac8daca4b5dfd4326beda08659cc7066e742c5739c2055d0b075399cbfd041ab48a04781d030235d36b14f68f4c327f350eb91cd78d747b4c1defeb98e306"}], 0x6b8, 0x44}, 0x4000) socketpair(0x0, 0x0, 0x1, &(0x7f0000000280)) 23:26:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5da}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x273}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:52 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:52 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x589}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x760}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:52 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0xfdff, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:52 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x8080b, 0xd89, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000740)) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000440)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0xf, 0x400, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r4, r3, 0x0, 0x3}, 0x10) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x2, 0x2, {0xa, 0x4e20, 0x9, @mcast1, 0x7}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="719ae721ac9da63dd3b13e539b8bc7ee6168e9ba29cf6b223c3d9c72bd5eda685d4d6d172da835d7a58c26c07da3f0a86463177b6bb49c6beb1947553908c0d88a7f81ea7757e6ea5970bcd1245e4bc6c9371af0b0a778b0dd4d2c095284cee2856eb0a2320d17458d", 0x69}, {&(0x7f0000000580)="451a7b6178c82803c63022576dd5aa9ce3b73e855a220abf6b583e6fc8979f2010e852b60659c0b49b1e", 0x2a}], 0x2, &(0x7f0000000600)=[{0x98, 0x10d, 0x180000000000, "060cc00ee50b651e5ce3625a5bcaf525f8ee3b6a07c81844c2c66d9eef49bbaa67da3e11afe43a1be1edd3233c2593d30bb04419448e2b4899598e53a26f4460f9925fc7f089186067d76aa725a6657460ca644fa037b52cc747609e5c4b402672cc22f69f86c85eb2cae8d58175bd0b268ceb17971c3c29fb917137ab7f9aa9ebfd8789"}], 0x98, 0x10}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000700)) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:52 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x17d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:52 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1bd}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3a2}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:53 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:53 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd4, 0x20}, 0x2c) r1 = socket$kcm(0x2, 0xb, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000000000000001d0000000020ae428cc24af510bbe2cf92030f73a31219381506d39ee2cb26ac2d8bab9d912e26722260ae1400ba41ba"], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000400)="8d9fb95793253b000a2b7889dae8879357fd501a6aae88a3ab61cdc3304df58adef891d5f4b56b52a88d2823e6844181687212ccb36877ca1de07e2dfac8b770cc45b7138c1de715e32c2fb5a71dc7e904a50563c7429afd328da89318bafe200c0d286198677917790a9e355328bb65162ff3bad7e087527e65849909be90a4c3ea2726ad3423f46f6f12475c64e8a98489a3703e2aad"}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065f20300010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x69a}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2ce}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2fd}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:53 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='cgroup:\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:53 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:53 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x1d5}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x789}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x478}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:53 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x89f}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:53 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x37}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x58d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:53 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x1800000000000006, 0xe, 0xfffffffffffffe8a, &(0x7f00000002c0)="b90703e69ebf08bb64879e100800", &(0x7f0000000100)=""/41, 0x66}, 0xfffffec7) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:54 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:54 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000400)={0x2, &(0x7f00000002c0)=[{0x7bf8fa5e, 0x32, 0x3, 0x8}, {0xfff, 0x100000000, 0x8001}]}) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x229}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x351}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:54 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00', 0xffffffffffffffff}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2, 0x4, 0x3633, 0xfffffffffffff40b, 0x0, 0x0, 0x80, 0x5, 0x3ff, 0x9, 0x0, 0xff, 0xffffffff, 0x5, 0x9, 0x2, 0x6, 0x800, 0x7, 0xff, 0x7, 0x3, 0xffff, 0x3000000000000000, 0x0, 0x9, 0x0, 0xa208, 0x400, 0x5, 0x2, 0x8, 0x100000001, 0xfffffffffffffff7, 0x3ff, 0x40, 0x0, 0x1, 0x0, @perf_config_ext={0x80, 0x401}, 0x200, 0x80000001, 0x80, 0x0, 0x3, 0x1, 0x401}, r0, 0x3, r1, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:54 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x564}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:54 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0xb8dc, 0x6, 0x20, 0x313, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x5, 0x7fffffff, 0x1f, 0xfffffffffffff800, 0xfffffffffffffffc, 0x0, 0x1ff, 0x4, 0x20, 0xfffffffffffffffe, 0x123, 0xce7, 0x80, 0x3, 0x101, 0x2b219e46, 0xbf1, 0x8001, 0x8000, 0x7, 0x8, 0x79, 0x1ff, 0x3, 0x1b, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x80, 0x100000001, 0x7, 0x4, 0x1, 0xffffffffffffff01, 0x3}, r2, 0x10, r1, 0x8) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x587}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:54 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x50d}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x56c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:54 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0ae96fab90f6e0f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x0, 0x800, 0x23, &(0x7f0000000040)={0xffffffffffffffff}) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000018c0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) recvmsg$kcm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000400)=""/255, 0xff}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/73, 0x49}, {&(0x7f0000000500)=""/145, 0x91}, {&(0x7f00000005c0)=""/219, 0xdb}, {&(0x7f00000006c0)=""/142, 0x8e}, {&(0x7f0000000080)=""/35, 0x23}], 0x7, &(0x7f0000001840)=""/100, 0x64, 0x5}, 0x40000000) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:54 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x4200, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x309) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x737}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:54 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3dc}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:54 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xa1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x9e}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:55 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:55 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000019c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) recvmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000500)=""/167, 0xa7}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/150, 0x96}, {&(0x7f0000000680)=""/47, 0x2f}, {&(0x7f00000006c0)=""/87, 0x57}, {&(0x7f00000017c0)=""/239, 0xef}], 0x6, 0x0, 0x0, 0x9}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0xb, 0x9, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x154}, [@jmp={0x5, 0x3, 0x7, 0x1, 0x0, 0x50, 0xfffffffffffffffd}, @generic={0x80, 0x9, 0x100, 0x20}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000400)='GPL\x00', 0x1ff, 0xa, &(0x7f0000000440)=""/10, 0x41000, 0x1, [], r4}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:55 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x100000000000, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x435}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x650}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:55 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2af}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:55 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=ANY=[@ANYBLOB="000000000000000000170000c6000000"], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000400)="b90703e69ebf08bb64879e100800", &(0x7f00000002c0)=""/41}, 0x37) socketpair(0x0, 0x200000000, 0x0, &(0x7f0000000280)) 23:26:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x470}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:55 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x70f}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:55 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x69c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:55 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r1, 0x7, 0x1, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}, 0x20) socketpair(0x2, 0xa, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=ANY=[@ANYBLOB="10000079f75743000000000000000000"], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0xfffffffffffffffe, 0x3, &(0x7f0000000400)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x9c5e) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x1800000000000006, 0xfffffeb1, 0x29, &(0x7f00000002c0)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x6c}, 0xffffffffffffffec) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x0) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:55 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x412}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x548}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:55 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x12}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:56 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000069, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x237}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x424}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:56 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x9e) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0x50, &(0x7f0000000400)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x200, 0x3, 0x9, 0x3bc8, 0x0, 0x3, 0x800, 0x2, 0x8000, 0x3, 0x8, 0x0, 0x9, 0x8001, 0x1f, 0x7, 0x3ff, 0x956, 0x7, 0x2, 0x722, 0x6, 0x4, 0x1000, 0x100000000, 0x101, 0x80000001, 0x3, 0x1ff, 0xd611, 0x890, 0xfffffffffffffffe, 0x6, 0xf202, 0x2, 0x7f, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x3c40}, 0x0, 0x9, 0x9, 0x6, 0x7, 0x5, 0xff}, r3, 0x7, 0xffffffffffffff9c, 0x1) 23:26:56 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000c00)="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", 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfffffffffffffdc3, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x624}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x22e}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:56 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe80, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:56 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2f, 'cpu'}, {0x2d, 'pids'}, {0x2f, 'rdma'}, {0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x1a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x14a}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x12}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x154}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:56 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair(0x2, 0x2, 0x9, &(0x7f0000000140)={0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0xfffffd55, &(0x7f00000002c0)="b90703e69ebf08bb64879ef95a00", &(0x7f0000000100)=""/41, 0x69}, 0x20) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r2, &(0x7f0000000080)=0xffffffffffffffe0, 0x12) 23:26:56 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x2000000e, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x63a}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:56 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0x5, 0x4, 0xfffffffffffffffe, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xcf}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x828}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x17, 0x12, &(0x7f00000002c0)=@raw=[@map={0x18, 0x1, 0x1, 0x0, 0x1}, @jmp={0x5, 0x8, 0xf, 0xf, 0xe, 0xfffffffffffffffc, 0x4}, @ldst={0x1, 0x2, 0x6, 0xf, 0xa, 0x80, 0xc}, @call={0x85, 0x0, 0x0, 0x40}, @exit, @map={0x18, 0xd, 0x1, 0x0, 0xffffffffffffff9c}, @map, @ldst={0x1, 0x2, 0x1, 0x9, 0x2, 0xfffffffffffffff0, 0x27047276779a47e3}, @ldst={0x1, 0x1, 0x3, 0x0, 0x7, 0xffffffffffffffff}], &(0x7f0000000040)='GPL\x00', 0x3, 0xab, &(0x7f0000000380)=""/171, 0x41100, 0x1, [], r0, 0x7}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0x50, &(0x7f0000000440)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x53f}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x20a}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:57 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x69, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x3ec}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:57 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r1, 0x4) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x2, 0x946, 0x3, 0x0, 0x4, r2, 0xfffffffffffffc01}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x484}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100860000040400000100ff60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2dc}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1d, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x401, 0x0, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)={0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000080)=r0) 23:26:57 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:57 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x1, 0x3, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x4d}, @alu={0x4, 0x439f8355, 0x7, 0x7, 0x2, 0x100}, @call={0x85, 0x0, 0x0, 0x30}, @call={0x85, 0x0, 0x0, 0x2c}, @ldst={0x0, 0x3, 0x1, 0x0, 0x3, 0xfffffffffffffff0}]}, &(0x7f0000000400)='syzkaller\x00', 0x278000000000000, 0xd7, &(0x7f0000000440)=""/215, 0x41000, 0x1, [], 0x0, 0xb}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000100000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) socketpair(0xb, 0x80000, 0x3, &(0x7f0000000040)) 23:26:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x31b}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x79e}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x8c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:57 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x69, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:57 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000080bfa3000000e2ffff0603000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d61b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:57 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b7020000103bc2eb0e3f4b23f707000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a0000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r1, 0x3, 0x1, 0x0, &(0x7f00000002c0)=[0x0, 0x0], 0x2}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x68}, 0x28) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x3f, 0x1, 0x6, 0x2, 0x0, 0x400, 0x22, 0xb, 0x1040, 0x88, 0x7fff, 0x1, 0x100000000, 0xffffffffffff7fff, 0xff, 0x2, 0x0, 0x0, 0x9, 0xfea, 0x81, 0x6, 0x3, 0x6, 0xff, 0xfffffffffffffff7, 0xfffffffffffffffd, 0xf305, 0x10001, 0xfffffffffffffffd, 0x7, 0x1ff, 0x4, 0x5, 0x7, 0x4, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000280), 0xd}, 0x200, 0xda, 0x1, 0x7, 0x3ff, 0x9, 0x4}, r2, 0x9, r1, 0xa) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6e7}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:57 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x7e1}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:57 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x194}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:58 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000780)) 23:26:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x36a}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:58 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b96903e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x2a8}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:58 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000000000000000000000000000000b344bd1babe32bcc78a846268385bde44ee9a99681482f2654f30ad35ae773a46e3e483559b1385148fe619d976e88015ccb7004e220461a11cbabe9413b508b0529f889ce5b484774beb163f72bad39aafca80a2ad8157c57ecf4649e198d9263b0"], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0xffffffffffffffff, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x4b8}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6fe}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:58 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90769e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x45a}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:58 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=ANY=[@ANYBLOB="b3f86f819fefd63c0000001000000000"], 0x10, 0x8000}, 0x20004005) socket$kcm(0x29, 0x2, 0x0) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x63e}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:58 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000007c0)={&(0x7f00000002c0)=@nfc_llcp={0x27, 0x1, 0x81, 0x7, 0x7, 0x1, "31e443edfe4e2f348b9437fa1fa18bcae754d9821dfbb089784a6d63ed2701157fa55a4d2874ccfa102f59acf31c648dabe3eddd794232bd38658549758218", 0x39}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="78798e25580979b6a20342a6746eecedf0be0c3e8d6133e4f446a9f1f2a7c05cc656942770b1213a58d5eea54cd50c0b0c2f403b9b02c2d16ec64b8d9e2e6aed3e28a60ed2f1c9eaa55f7a5e179d32b1adc8542b7a654273fb7e66e204b180fec26a39e33dfdf4f2fdad", 0x6a}, {&(0x7f0000000100)="030f0b67e256dd5e455dbb67270f882001bec8f086b1d1230a3723", 0x1b}, {&(0x7f0000000480)="6f53bc393054ce54cf920c4e8d06de1b1b403c74c414be3495e5147ddef54ab37f", 0x21}, {&(0x7f00000004c0)="1f153e831f3259c2aef491277bc0da2404b5fe1bf8aa1370d3efd1b665b11409515c9da5b47a60b8026a2212a47c46a5d09fae84b0c39ab92f273fc8e1a41fc2849e3cb58d9da4e819a0561356361e978e7b2b9a106ef4d5bc4f4fdd3a01c7747cc01adeb5f28a", 0x67}], 0x4, &(0x7f0000000580)=[{0x58, 0x112, 0x100000001, "e4c097c1a0a3af7d8db3e0d04aedd693abbca39b4e0782a8f870bac6ddb89dd8b022143278df17eead5cc4562cac39384ce5835b00347edaea6e71c8f750674d7737bd5f8afc89"}, {0x90, 0x115, 0x200, "f00f2510787c625afea2b6e50340d8ba8b2e059cd417b33c2b1efdc3df46522ee40b257204d81d68c438053e86ac35073c77924560ef12e951862ab9da1fe6a0d902551ab923b7487856f88796a77a83e187a0ff74ce29bcb9c16a70e6852db5de8c579bfe6a044c454a23e74c49db106ad6d717a090bc3c0ab7ec5114b61465"}, {0x108, 0x13d, 0x2, "5dca03dedb27b8e2d52b83e219b7e8d7cbf4b2e2d30b7f8369ce39c1931d4be5c60acc0d373b23ada0e6156ed88eeb96daec3f0dbf366c9ec0ace660d4ecaf7a8177989a1ddd80c5bb0e7eb92f48f653bee861720ade6e1f6755f5c73dcfbad19141c69b265e43daf349d75c6186038ef5aeab1bb1a633ee7c210d561c00c9eb8afda0230356dfb472e584876f893fde51e8c6114781d7bca4ca3f04f264d22cd0b5a830f78d5e693d0f3789ca30186380a3c91f3086a25997f6e0eed4548b6968b6cf11e34dd7f4701dc82f1f2bcf3456cdf462e2aaf010c00132961a436a938d7a1da996f3fffbaa57389a581b9a1ab6f3"}], 0x1f0, 0x20000810}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000007f79000000feffff7a0af0ff00000000b7060000ffffffff2d6405000000000065b7030006000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000000000000000000000000000000000000000040000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 23:26:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0xbb}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x86e}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:58 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf69bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:58 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703090000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065f90300010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x5, &(0x7f0000000780)) 23:26:58 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x3, 0xab4, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:58 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x517}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:58 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x52c}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:59 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf05bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:59 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000680)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000380)='./file0\x00', r1}, 0x10) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000500)=0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) recvmsg$kcm(r2, &(0x7f0000004c40)={&(0x7f0000003780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000003800)=""/149, 0x95}, {&(0x7f00000038c0)=""/240, 0xf0}, {&(0x7f00000039c0)=""/4096, 0x1000}, {&(0x7f00000049c0)=""/168, 0xa8}, {&(0x7f0000004a80)=""/203, 0xcb}], 0x5, &(0x7f0000004c00)=""/30, 0x1e, 0x100000000}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000004c80)={0x5, 0x4, &(0x7f0000000280)=@raw=[@alu={0x4, 0x4, 0xf, 0x3, 0x7, 0x0, 0x10}, @ldst={0x3, 0x0, 0x1, 0x9, 0x2, 0x1}], &(0x7f00000002c0)='GPL\x00', 0xc2d3, 0xf2, &(0x7f0000000400)=""/242, 0x41000, 0x1, [], r4}, 0x48) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x700}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:59 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000074a66e35feff4e42df6e6bfe11a13d182660b23b73f1d6fbdaa60d345ae206c2b2be1dc15abca9212fc9728758ae70c41c5b060e4985df82fe343e46e1e14a73b5466dbc5556b07b3002dda10ad75d9647a13b710bd988ade29f4a642827188f74fcf8892698c569018f95309e9e0b79b53803312b0c39"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x111}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:59 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb69879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x695}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:59 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x533}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:59 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000740)={&(0x7f00000002c0)=@rc, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/86, 0x56}, {&(0x7f0000000480)=""/126, 0x7e}, {&(0x7f0000000500)=""/196, 0xc4}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/149, 0x95}], 0x7, &(0x7f00000027c0)=""/221, 0xdd, 0x1}, 0x40002020) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff790c8a2300000000b7060000ff0000650404000600000004041e0001007d60b7030000000000006a0a000701000000850000000d000000b700000000000000950000000000000000bb04f67100100000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000080)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x800006a}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x5) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000068000000008d0e000000000000"]) sendmsg$kcm(r1, &(0x7f0000003a40)={&(0x7f00000028c0)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000002940)="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", 0x1000}, {&(0x7f0000003940)="32f119f5caf66f4ec82f40a225eef1ad0213508ab8f88f94a90aefd52aa36b30c82684fa5195a9ba7d2e1e7e3fb3755f9db9dc46c950bfcec32258dcbfd746883b37f39ae99df01c1f120b1ed4c3c79482d137a69f61bc8f1560fa51379d366cca819af1a8de6dff12d22350fbee18b7fab743c07da15d6d51ade87f4ccd8879d4d3834bf6588479de1b33a39f960738f20b1336767dde208f123f69da39f1a9a43195d47ac2", 0xa6}], 0x2, 0x0, 0x0, 0x20000040}, 0x40000) 23:26:59 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x643}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x5f3}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:59 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e690800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:26:59 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000d000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000080)=""/41, 0x69}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f0000000400)=""/226, 0xe2, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r3, 0x4) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x8, 0x4) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:26:59 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) sendmsg$kcm(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000400)="6df754467927587c944ab109f052353d41d76fcb0167fbbcf061b164c39a83f2f4bbd073f2d3d9d79bd85f9b059924934f07e3008b8b8a5fc1b68b3fe3ac214f8c320c29d552e1e668872baa3de71b8ee131c0b6bc99d6f96c8f3452206d22828cff0df13775b42f6d7e8cff77b82f8d3a50cd27282d83f4c02e7f7ca9bd93e66df8551cc436d815271b87eff3d5a21c82df72a8d9c3d687edec2b1478411b9a9cdc", 0xa2}, {&(0x7f00000004c0)="b63e3dc17b0859231535904fcbb6c7bfedf6070d25bf8fee10055c3095735165597a08663ac7b3a35ad687278808c0320f0974b47842344e871f7aa68869dad08195e8b1200629bf01defbc64686b2f4d52e3d9874650053d1d2174f94fa404b7bfd7ea121bfb02d", 0x68}, {&(0x7f0000000540)="467c165ff742c109a3bd3d7ed88e552eca9915294a08bb618e916e7ca362ff29c6e167e055cd544bb494f314392c621c171eb198f69d0a1238c26ea9f8f1b31df385cc1ded6ee8d6dc0a1292ddbe4e5cbe574407cd15cfda4ca1b1309a3e77ac1d32ff853df83150889b6686447f3fc28f1f1fb8c0a4041d58a221c8c67d95a4d6b3", 0x82}, {&(0x7f0000000600)="80949771c1edd2410b5b7c6f3f9b888bbbbd2fce363cb3a4d9898947f89d5c7789cf4f8e1d9e7db3cb169b9faaf0b4f9764fb8fa24498ebc7ab94550b7f23f75f341abb9a88455c3a278ab1b3dc8d0a0114b15a13bec085241ab5b5449e0d3b3a72829cb3ca244f2cac4e0fca3c2d0986bc25bda3481c96fc6a6e3d4f9c2577ee73d0745d729aa2ff64927a7ccf373f5b3f9cdfffaeda695bc0ce362a743ac894a30be079fd25fe1b6e3efee00fdb432a2e54f37ba18f751109406c06b41d449cddbf3059e34e54b3094201448cb454546eb7c218d1302e4", 0xd8}], 0x4, 0x0, 0x0, 0x840}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)='syzkaller\x00') socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000740)) socketpair(0x40000000009, 0x5, 0x5, &(0x7f0000000780)) 23:26:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x6a1}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) 23:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x761}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) getpid() bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x0, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f}}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x0, 0x1}, 0x48) close(0xffffffffffffffff) 23:26:59 executing program 4: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x7, 0x1, &(0x7f0000000780)) 23:27:00 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000010500)={&(0x7f000000f380)=@can, 0x80, &(0x7f0000010400)=[{&(0x7f000000f400)=""/4096, 0x1000}], 0x1, &(0x7f0000010440)=""/137, 0x89, 0x3f}, 0x12061) socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa3000000000000070391b9d908c2bb7da4f0fff8ffffff79a4f0ff00000000b7060000ffffeeff2d6405000000000065040400010000001804000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) 23:27:00 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000010880)={&(0x7f0000010540)=@ll={0x11, 0x0, 0x0, 0x1, 0x5, 0x6, @local}, 0x80, &(0x7f0000010640), 0x0, &(0x7f0000010680)=[{0x10}], 0x10, 0x8000}, 0x20004005) socketpair(0xf, 0x0, 0x3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) socketpair(0x11, 0x80000, 0x401, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair(0x0, 0x0, 0x1, &(0x7f0000000780)) 23:27:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000600)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x33b}, 0x28) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000002c40)=ANY=[]}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)="63707573657409006616b182ea4d502b666563746976", 0x0, 0x0) r3 = getpid() recvmsg$kcm(r2, &(0x7f0000006380)={&(0x7f0000005d00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006240)=[{&(0x7f0000005d80)=""/148, 0x94}, {&(0x7f0000005e40)=""/254, 0xfe}, {&(0x7f0000005f40)=""/39, 0x27}, {&(0x7f0000005f80)=""/1, 0x1}, {&(0x7f0000005fc0)=""/82, 0x52}, {&(0x7f0000006040)=""/127, 0x7f}, {&(0x7f00000060c0)=""/165, 0xa5}, {&(0x7f0000006180)=""/141, 0x8d}], 0x8, &(0x7f00000062c0)=""/164, 0xa4, 0x1000}, 0x2040) bpf$PROG_LOAD(0x5, &(0x7f00000063c0)={0x7, 0x5, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x37d}, [@exit]}, &(0x7f0000000340)='syzkaller\x00', 0x3f3, 0x8d, &(0x7f0000000480)=""/141, 0x41000, 0x1, [], r4, 0xa}, 0x48) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x2, 0x9, 0x80000000, 0x184a308e, 0x0, 0x3, 0x20005, 0x2, 0x5, 0x7, 0x2, 0x5, 0x3, 0xffff, 0x0, 0x2, 0x3, 0x2, 0x4, 0x20, 0x1000, 0x20000000, 0xd5, 0x4b8, 0x6fb, 0xa7, 0x4, 0x1, 0x80000000, 0x6, 0x9300, 0x37e07c6, 0x3, 0x8001, 0x2294, 0x101, 0x0, 0xfffffffffffffff8, 0x7, @perf_config_ext={0x1, 0x3ff}, 0x0, 0x73b23b9a, 0xfffffffffffffffa, 0x7, 0xa6, 0x8}, r3, 0x8, r2, 0x2) getpid() perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x100000001, 0x48, 0x5, 0x6, 0x0, 0x1, 0x0, 0xe, 0x200, 0x101, 0x5, 0x80000001, 0x6, 0x1, 0x7ff, 0x4, 0x1, 0x3, 0xff, 0xff, 0xfffffffffffffff8, 0x4988, 0xfffffffffffffffa, 0x63b, 0x2, 0x3, 0x9, 0xfffffffffffffff8, 0x3, 0x2, 0x3e32, 0x3, 0x4, 0x7, 0x81, 0x0, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000640), 0x2}, 0x201, 0x5, 0xfdf0000000000, 0x4, 0x10001, 0x1, 0x9}, r3, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x5, 0x101, 0xdde4, 0x0, 0x4, 0x10000, 0xc, 0x4, 0x7, 0x8, 0x0, 0x9, 0x7f, 0xfffffffffffffeff, 0x4, 0x20, 0x8, 0x400, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x20}, 0x40, 0x80e, 0x3, 0x5, 0x4, 0x7, 0x100}, r3, 0x1, r2, 0x9) close(0xffffffffffffffff) 23:27:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000020000006a0a00fe000000088500000053000000b7000000000000009500040000000000"], &(0x7f0000000380)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x81, &(0x7f0000000440)="bd25e7b9d668c6e5db803ff1dcbd", &(0x7f00000000c0)=""/129, 0x15f}, 0x28) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xc, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x1, 0x401, 0xfffffffffffff4f3, 0x1, 0xfd77, 0xfffffffffffff000, 0x6, 0x10001, 0x6, 0xfffffffffffffffb, 0x4, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}, 0x40, 0x0, 0x3, 0x0, 0x0, 0x7, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x9) [ 1595.689970] ================================================================== [ 1595.697716] BUG: KASAN: slab-out-of-bounds in _decode_session6+0x134a/0x1500 [ 1595.704913] Read of size 1 at addr ffff8801d7dc6f07 by task syz-executor4/2502 [ 1595.712274] [ 1595.713920] CPU: 0 PID: 2502 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #133 [ 1595.721198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1595.730565] Call Trace: [ 1595.733199] dump_stack+0x1c4/0x2b6 [ 1595.736836] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1595.742100] ? printk+0xa7/0xcf [ 1595.745424] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1595.750205] print_address_description.cold.8+0x9/0x1ff [ 1595.755578] kasan_report.cold.9+0x242/0x309 [ 1595.759988] ? _decode_session6+0x134a/0x1500 [ 1595.764497] __asan_report_load1_noabort+0x14/0x20 [ 1595.769442] _decode_session6+0x134a/0x1500 [ 1595.773806] __xfrm_decode_session+0x71/0x140 [ 1595.778312] vti6_tnl_xmit+0x3fc/0x1c0e [ 1595.782299] ? __lock_acquire+0x7ec/0x4ec0 [ 1595.786551] ? vti6_rcv+0x8e0/0x8e0 [ 1595.790191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.795735] ? check_preemption_disabled+0x48/0x280 [ 1595.800754] ? check_preemption_disabled+0x48/0x280 [ 1595.805807] dev_hard_start_xmit+0x295/0xc90 [ 1595.810238] ? dev_direct_xmit+0x6b0/0x6b0 [ 1595.814486] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1595.820027] ? netif_skb_features+0x690/0xb70 [ 1595.824525] ? unwind_dump+0x190/0x190 [ 1595.828433] ? lock_acquire+0x1ed/0x520 [ 1595.832413] ? __dev_queue_xmit+0x2fff/0x3950 [ 1595.836922] ? lock_release+0x970/0x970 [ 1595.840903] ? validate_xmit_skb+0x80c/0xf30 [ 1595.845328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.850872] ? check_preemption_disabled+0x48/0x280 [ 1595.855909] __dev_queue_xmit+0x2f0d/0x3950 [ 1595.860240] ? save_stack+0x43/0xd0 [ 1595.863869] ? kasan_kmalloc+0xc7/0xe0 [ 1595.867767] ? __kmalloc_node_track_caller+0x47/0x70 [ 1595.872890] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 1595.877843] ? netdev_pick_tx+0x310/0x310 [ 1595.882009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.887557] ? check_preemption_disabled+0x48/0x280 [ 1595.892582] ? check_preemption_disabled+0x48/0x280 [ 1595.897660] ? __lock_is_held+0xb5/0x140 [ 1595.901750] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1595.906780] ? skb_release_data+0x1c4/0x880 [ 1595.911136] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1595.916421] ? kasan_unpoison_shadow+0x35/0x50 [ 1595.921008] ? skb_tx_error+0x2f0/0x2f0 [ 1595.925010] ? __kmalloc_node_track_caller+0x47/0x70 [ 1595.930123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1595.935675] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1595.941247] ? kasan_check_write+0x14/0x20 [ 1595.945488] ? pskb_expand_head+0x6b3/0x10f0 [ 1595.949915] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1595.954424] ? skb_checksum+0x140/0x140 [ 1595.958455] ? kasan_check_write+0x14/0x20 [ 1595.962711] ? __skb_clone+0x6c7/0xa00 [ 1595.966605] ? __copy_skb_header+0x6b0/0x6b0 [ 1595.971025] ? kmem_cache_alloc+0x33a/0x730 [ 1595.975370] ? skb_ensure_writable+0x15e/0x640 [ 1595.979959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1595.985518] dev_queue_xmit+0x17/0x20 [ 1595.989330] ? dev_queue_xmit+0x17/0x20 [ 1595.993310] __bpf_redirect+0x5cf/0xb20 [ 1595.997324] bpf_clone_redirect+0x2f6/0x490 [ 1596.001667] bpf_prog_c39d1ba309a769f7+0xf2b/0x1000 [ 1596.006718] ? ctrl_getfamily+0x290/0x420 [ 1596.010873] ? lock_downgrade+0x900/0x900 [ 1596.015026] ? ktime_get+0x352/0x440 [ 1596.018761] ? find_held_lock+0x36/0x1c0 [ 1596.022857] ? lock_acquire+0x1ed/0x520 [ 1596.026836] ? bpf_test_run+0x3cb/0x780 [ 1596.030819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.036375] ? check_preemption_disabled+0x48/0x280 [ 1596.041434] ? kasan_check_read+0x11/0x20 [ 1596.045605] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1596.050885] ? rcu_bh_qs+0xc0/0xc0 [ 1596.054431] ? bpf_cgroup_storage_release+0x220/0x220 [ 1596.059633] ? skb_try_coalesce+0x1b70/0x1b70 [ 1596.064145] ? bpf_test_run+0x25d/0x780 [ 1596.068148] ? netlink_diag_dump+0x2a0/0x2a0 [ 1596.072573] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1596.078115] ? bpf_test_init.isra.10+0x70/0x100 [ 1596.082793] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1596.087574] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1596.092418] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1596.097964] ? fput+0x130/0x1a0 [ 1596.101249] ? __bpf_prog_get+0x9b/0x290 [ 1596.105343] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1596.110198] ? bpf_prog_test_run+0x130/0x1a0 [ 1596.114623] ? __x64_sys_bpf+0x3d8/0x520 [ 1596.118688] ? bpf_prog_get+0x20/0x20 [ 1596.122515] ? do_syscall_64+0x1b9/0x820 [ 1596.126586] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1596.131958] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1596.136894] ? trace_hardirqs_on_caller+0x310/0x310 [ 1596.141917] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1596.146943] ? recalc_sigpending_tsk+0x180/0x180 [ 1596.151733] ? kasan_check_write+0x14/0x20 [ 1596.155988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1596.160880] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1596.166258] [ 1596.167887] Allocated by task 2502: [ 1596.171522] save_stack+0x43/0xd0 [ 1596.174976] kasan_kmalloc+0xc7/0xe0 [ 1596.178694] __kmalloc_node_track_caller+0x47/0x70 [ 1596.183637] __kmalloc_reserve.isra.39+0x41/0xe0 [ 1596.188392] pskb_expand_head+0x230/0x10f0 [ 1596.192627] skb_ensure_writable+0x3dd/0x640 [ 1596.197043] bpf_clone_redirect+0x14a/0x490 [ 1596.201420] bpf_prog_c39d1ba309a769f7+0xf2b/0x1000 [ 1596.206434] [ 1596.208059] Freed by task 1075: [ 1596.211373] save_stack+0x43/0xd0 [ 1596.214832] __kasan_slab_free+0x102/0x150 [ 1596.219064] kasan_slab_free+0xe/0x10 [ 1596.222876] kfree+0xcf/0x230 [ 1596.226003] load_elf_binary+0x25b4/0x5620 [ 1596.230244] search_binary_handler+0x17d/0x570 [ 1596.234827] __do_execve_file.isra.33+0x162f/0x2540 [ 1596.239850] __x64_sys_execve+0x8f/0xc0 [ 1596.243829] do_syscall_64+0x1b9/0x820 [ 1596.247721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1596.252905] [ 1596.254539] The buggy address belongs to the object at ffff8801d7dc6d00 [ 1596.254539] which belongs to the cache kmalloc-512 of size 512 [ 1596.267235] The buggy address is located 7 bytes to the right of [ 1596.267235] 512-byte region [ffff8801d7dc6d00, ffff8801d7dc6f00) [ 1596.279485] The buggy address belongs to the page: [ 1596.284421] page:ffffea00075f7180 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 1596.292612] flags: 0x2fffc0000000100(slab) [ 1596.296855] raw: 02fffc0000000100 ffffea0006efe088 ffffea000739f248 ffff8801da800940 [ 1596.304745] raw: 0000000000000000 ffff8801d7dc6080 0000000100000006 0000000000000000 [ 1596.312640] page dumped because: kasan: bad access detected [ 1596.318344] [ 1596.319971] Memory state around the buggy address: [ 1596.324911] ffff8801d7dc6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1596.332281] ffff8801d7dc6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1596.339665] >ffff8801d7dc6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1596.347022] ^ [ 1596.350399] ffff8801d7dc6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1596.357760] ffff8801d7dc7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1596.365118] ================================================================== [ 1596.372478] Disabling lock debugging due to kernel taint [ 1596.378024] Kernel panic - not syncing: panic_on_warn set ... [ 1596.378024] [ 1596.385411] CPU: 0 PID: 2502 Comm: syz-executor4 Tainted: G B 4.19.0-rc8+ #133 [ 1596.394099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1596.403483] Call Trace: [ 1596.406110] dump_stack+0x1c4/0x2b6 [ 1596.409763] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1596.414967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1596.419734] panic+0x238/0x4e7 [ 1596.422933] ? add_taint.cold.5+0x16/0x16 [ 1596.427100] ? trace_hardirqs_on+0xb4/0x310 [ 1596.431447] ? trace_hardirqs_on+0xb4/0x310 [ 1596.435774] kasan_end_report+0x47/0x4f [ 1596.439758] kasan_report.cold.9+0x76/0x309 [ 1596.444087] ? _decode_session6+0x134a/0x1500 [ 1596.448589] __asan_report_load1_noabort+0x14/0x20 [ 1596.453528] _decode_session6+0x134a/0x1500 [ 1596.457861] __xfrm_decode_session+0x71/0x140 [ 1596.462377] vti6_tnl_xmit+0x3fc/0x1c0e [ 1596.466370] ? __lock_acquire+0x7ec/0x4ec0 [ 1596.470616] ? vti6_rcv+0x8e0/0x8e0 [ 1596.474269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.479812] ? check_preemption_disabled+0x48/0x280 [ 1596.484838] ? check_preemption_disabled+0x48/0x280 [ 1596.489882] dev_hard_start_xmit+0x295/0xc90 [ 1596.494315] ? dev_direct_xmit+0x6b0/0x6b0 [ 1596.498574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1596.504137] ? netif_skb_features+0x690/0xb70 [ 1596.508630] ? unwind_dump+0x190/0x190 [ 1596.512523] ? lock_acquire+0x1ed/0x520 [ 1596.516498] ? __dev_queue_xmit+0x2fff/0x3950 [ 1596.521013] ? lock_release+0x970/0x970 [ 1596.524991] ? validate_xmit_skb+0x80c/0xf30 [ 1596.529406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.534974] ? check_preemption_disabled+0x48/0x280 [ 1596.540011] __dev_queue_xmit+0x2f0d/0x3950 [ 1596.544339] ? save_stack+0x43/0xd0 [ 1596.547969] ? kasan_kmalloc+0xc7/0xe0 [ 1596.551861] ? __kmalloc_node_track_caller+0x47/0x70 [ 1596.556972] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 1596.561914] ? netdev_pick_tx+0x310/0x310 [ 1596.566107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.571650] ? check_preemption_disabled+0x48/0x280 [ 1596.576681] ? check_preemption_disabled+0x48/0x280 [ 1596.581725] ? __lock_is_held+0xb5/0x140 [ 1596.585797] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1596.590832] ? skb_release_data+0x1c4/0x880 [ 1596.595163] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1596.600451] ? kasan_unpoison_shadow+0x35/0x50 [ 1596.605034] ? skb_tx_error+0x2f0/0x2f0 [ 1596.609015] ? __kmalloc_node_track_caller+0x47/0x70 [ 1596.614145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1596.619693] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1596.625262] ? kasan_check_write+0x14/0x20 [ 1596.629532] ? pskb_expand_head+0x6b3/0x10f0 [ 1596.633953] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 1596.638449] ? skb_checksum+0x140/0x140 [ 1596.642440] ? kasan_check_write+0x14/0x20 [ 1596.646680] ? __skb_clone+0x6c7/0xa00 [ 1596.650571] ? __copy_skb_header+0x6b0/0x6b0 [ 1596.654984] ? kmem_cache_alloc+0x33a/0x730 [ 1596.659314] ? skb_ensure_writable+0x15e/0x640 [ 1596.663931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.669488] dev_queue_xmit+0x17/0x20 [ 1596.673288] ? dev_queue_xmit+0x17/0x20 [ 1596.677264] __bpf_redirect+0x5cf/0xb20 [ 1596.681268] bpf_clone_redirect+0x2f6/0x490 [ 1596.685607] bpf_prog_c39d1ba309a769f7+0xf2b/0x1000 [ 1596.690626] ? ctrl_getfamily+0x290/0x420 [ 1596.694790] ? lock_downgrade+0x900/0x900 [ 1596.698941] ? ktime_get+0x352/0x440 [ 1596.702659] ? find_held_lock+0x36/0x1c0 [ 1596.706726] ? lock_acquire+0x1ed/0x520 [ 1596.710709] ? bpf_test_run+0x3cb/0x780 [ 1596.714691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.720244] ? check_preemption_disabled+0x48/0x280 [ 1596.725267] ? kasan_check_read+0x11/0x20 [ 1596.729443] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1596.734747] ? rcu_bh_qs+0xc0/0xc0 [ 1596.738308] ? bpf_cgroup_storage_release+0x220/0x220 [ 1596.743497] ? skb_try_coalesce+0x1b70/0x1b70 [ 1596.748034] ? bpf_test_run+0x25d/0x780 [ 1596.752025] ? netlink_diag_dump+0x2a0/0x2a0 [ 1596.756445] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1596.761982] ? bpf_test_init.isra.10+0x70/0x100 [ 1596.766662] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 1596.771468] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1596.776312] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1596.782113] ? fput+0x130/0x1a0 [ 1596.785399] ? __bpf_prog_get+0x9b/0x290 [ 1596.789467] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 1596.794312] ? bpf_prog_test_run+0x130/0x1a0 [ 1596.798732] ? __x64_sys_bpf+0x3d8/0x520 [ 1596.802794] ? bpf_prog_get+0x20/0x20 [ 1596.806612] ? do_syscall_64+0x1b9/0x820 [ 1596.810674] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1596.816053] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1596.821001] ? trace_hardirqs_on_caller+0x310/0x310 [ 1596.826037] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1596.831062] ? recalc_sigpending_tsk+0x180/0x180 [ 1596.835831] ? kasan_check_write+0x14/0x20 [ 1596.840088] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1596.844945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1596.851332] Kernel Offset: disabled [ 1596.854957] Rebooting in 86400 seconds..