: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 15:28:26 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 15:28:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 15:28:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:26 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 15:28:26 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:26 executing program 1: socketpair(0x23, 0x80000, 0x1200, &(0x7f0000000080)) 15:28:26 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) 15:28:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) 15:28:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:26 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:26 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 1: socketpair(0x0, 0x80000, 0x1200, &(0x7f0000000080)) 15:28:27 executing program 5: socketpair(0x18, 0x0, 0x0, 0x0) 15:28:27 executing program 4: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: socketpair(0x18, 0x0, 0x0, 0x0) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 1: socketpair(0x0, 0x80000, 0x1200, &(0x7f0000000080)) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 5: socketpair(0x18, 0x0, 0x0, 0x0) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 1: socketpair(0x0, 0x80000, 0x1200, &(0x7f0000000080)) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x1200, &(0x7f0000000080)) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 15:28:27 executing program 4: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:27 executing program 4: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 15:28:27 executing program 4: socketpair(0x23, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x1200, 0x0) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 15:28:27 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x1200, 0x0) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 1: socketpair(0x23, 0x0, 0x1200, 0x0) 15:28:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 5: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x7, 0x10}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x6, 0x400, 0x8, 0x0, 0x1, 0xa0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5}, 0x48) 15:28:27 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 15:28:27 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:27 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000040), 0x2, 0x0) 15:28:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:27 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0xe0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000016c0)=[{}], 0x8, 0x10, &(0x7f0000001700), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001780)}}, 0x10) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000015c0)=ANY=[@ANYBLOB="01000980bbbbbbbbbbbb000000000000bbbbbbbbbbbb4772b8b01b5b0180c20000020180c2000000bbbbbbbbbbbbaaaaaaaaaa1aaaaaaaaaaa34"]) socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) 15:28:27 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:28:27 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000040), 0x2, 0x0) 15:28:28 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0xe0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000016c0)=[{}], 0x8, 0x10, &(0x7f0000001700), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001780)}}, 0x10) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000015c0)=ANY=[@ANYBLOB="01000980bbbbbbbbbbbb000000000000bbbbbbbbbbbb4772b8b01b5b0180c20000020180c2000000bbbbbbbbbbbbaaaaaaaaaa1aaaaaaaaaaa34"]) socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) 15:28:28 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000040), 0x2, 0x0) 15:28:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0xe0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000016c0)=[{}], 0x8, 0x10, &(0x7f0000001700), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001780)}}, 0x10) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000015c0)=ANY=[@ANYBLOB="01000980bbbbbbbbbbbb000000000000bbbbbbbbbbbb4772b8b01b5b0180c20000020180c2000000bbbbbbbbbbbbaaaaaaaaaa1aaaaaaaaaaa34"]) socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 15:28:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0xe0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000016c0)=[{}], 0x8, 0x10, &(0x7f0000001700), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001780)}}, 0x10) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000015c0)=ANY=[@ANYBLOB="01000980bbbbbbbbbbbb000000000000bbbbbbbbbbbb4772b8b01b5b0180c20000020180c2000000bbbbbbbbbbbbaaaaaaaaaa1aaaaaaaaaaa34"]) 15:28:28 executing program 4: socketpair(0x23, 0x0, 0x0, 0x0) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0xe0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000016c0)=[{}], 0x8, 0x10, &(0x7f0000001700), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001780)}}, 0x10) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) 15:28:28 executing program 1: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000780)={&(0x7f0000000000)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7f}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000080)="5f4bc9d0ad30278ceef632d20030dc50dfef1d5a26271605e9c0e528effed539cd7b1f3b1a1ccb56a2568cd873c0eaae57b7418bbee22f834603bd77ebc409e86c46d5cac38aa27ec850bf81f9be65da61e3bd8cb71058cce7c1dae3645f1c2432721cadaa097aaa5e62431de059b394c12da94ca2bc9199cf3e40003b9c30f573efdf3fa629526f39c1170bebc0683c66ddd8cbd69c92919722c94155567c1062966acc5198bfb8078f9f9a8d8195f2ed70c9139e873f400e120144de76fa8bbf223648b1de5eaf06831b1ac49157c1aec77e9419ad81cac666c115e57f272c838eff399c6a32", 0xe7}, {&(0x7f0000000180)="e62ebc6ef486fe700e41f44ad15bc61716d7c6b6362390e858c249fbd1bf4531e27af9a44d55dfd710b9a3019bc4855c2154e691d031fc69661d0cb9fdf0dbedb7e60c2cb19482d471fd999ef9fb3dbcbde39e349062c35bb11e570404797d3f07b5833979d831e78007c63ee5012dfeefe8bf246b8f79cb01566c6710a09ce92fbb58b0311979a68a9268ca8cd15c2fe5a69918a8f83853281af2ae813806b8d69b18545d788091ccff13a79c50304703483859a29d277e743282196c476a03fc3ac855820899270a82c875c4a20860d669c152d9a5c377b7ebb3b5678948ff06733a639e83dfe6430cb6", 0xeb}, {&(0x7f0000000280)="3f12945085ae9adb73c5000bba49e55b2220d8e9aa6565fcc55cc16bce86215b94283a585b65411d973ecdd78dc434bf60aafec6586383026521cb1c5b1dbe054a359756d3b3f49d36c998224155cd95f814b6f05b0acca1a237b8bc5717f039d6a05a184774ab83779fca3f3ba924df8ed7a8a9e9016e076177d3e7883ad9d63eda", 0x82}, {&(0x7f0000000340)="bb20d824fab72e38edcbd4f760d1ef", 0xf}, {&(0x7f0000000380)="4b7f9725287e836cfa6082111fba2de9ff9498e1a4ae33202f27e807586783c7ffb079dee7fc2231c83cc42fc260223cc9bf555b908ab52565a0f0c9fc069d330380e50a2b43dae5540944e6619ae479b47ab6d5b58c431f22044c7db6c275e79bd36cc45aa7444e37c789ff42106b591172be25", 0x74}, {&(0x7f0000000400)="cb1143571d8011ee", 0x8}, {&(0x7f0000000440)="4c91d7a74cdb7d7dec612d402775c792302913038e3f29eb34c3c8daf0582f8d61516b5fcd0542d261efdc3c53ee42249c6a7cfbbaccc58865505be72b74a264b45eb2cfc32094fcb9299c708337502fa17055268a1aa825bdce16863bfaa9f485e0be890d04ebf7a5ae6f602025feefba391ce35af91e082154856f5d11ffaf35b45a2fd4b2503018b5b780e9cd71b4e5b532e17b7448e818691e4b6bc26cd406967a42a82f5eebe5cca58df7e68a5a619836eb009baf0743", 0xb9}, {&(0x7f0000000500)="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", 0xfb}], 0x8, &(0x7f0000000680)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x255}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0xd8}, 0x40001) socketpair(0x28, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 4: socketpair(0x23, 0x0, 0x0, 0x0) 15:28:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000018c0)={r0, 0xe0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001600)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000016c0)=[{}], 0x8, 0x10, &(0x7f0000001700), &(0x7f0000001740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001780)}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 15:28:28 executing program 1: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000780)={&(0x7f0000000000)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7f}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000080)="5f4bc9d0ad30278ceef632d20030dc50dfef1d5a26271605e9c0e528effed539cd7b1f3b1a1ccb56a2568cd873c0eaae57b7418bbee22f834603bd77ebc409e86c46d5cac38aa27ec850bf81f9be65da61e3bd8cb71058cce7c1dae3645f1c2432721cadaa097aaa5e62431de059b394c12da94ca2bc9199cf3e40003b9c30f573efdf3fa629526f39c1170bebc0683c66ddd8cbd69c92919722c94155567c1062966acc5198bfb8078f9f9a8d8195f2ed70c9139e873f400e120144de76fa8bbf223648b1de5eaf06831b1ac49157c1aec77e9419ad81cac666c115e57f272c838eff399c6a32", 0xe7}, {&(0x7f0000000180)="e62ebc6ef486fe700e41f44ad15bc61716d7c6b6362390e858c249fbd1bf4531e27af9a44d55dfd710b9a3019bc4855c2154e691d031fc69661d0cb9fdf0dbedb7e60c2cb19482d471fd999ef9fb3dbcbde39e349062c35bb11e570404797d3f07b5833979d831e78007c63ee5012dfeefe8bf246b8f79cb01566c6710a09ce92fbb58b0311979a68a9268ca8cd15c2fe5a69918a8f83853281af2ae813806b8d69b18545d788091ccff13a79c50304703483859a29d277e743282196c476a03fc3ac855820899270a82c875c4a20860d669c152d9a5c377b7ebb3b5678948ff06733a639e83dfe6430cb6", 0xeb}, {&(0x7f0000000280)="3f12945085ae9adb73c5000bba49e55b2220d8e9aa6565fcc55cc16bce86215b94283a585b65411d973ecdd78dc434bf60aafec6586383026521cb1c5b1dbe054a359756d3b3f49d36c998224155cd95f814b6f05b0acca1a237b8bc5717f039d6a05a184774ab83779fca3f3ba924df8ed7a8a9e9016e076177d3e7883ad9d63eda", 0x82}, {&(0x7f0000000340)="bb20d824fab72e38edcbd4f760d1ef", 0xf}, {&(0x7f0000000380)="4b7f9725287e836cfa6082111fba2de9ff9498e1a4ae33202f27e807586783c7ffb079dee7fc2231c83cc42fc260223cc9bf555b908ab52565a0f0c9fc069d330380e50a2b43dae5540944e6619ae479b47ab6d5b58c431f22044c7db6c275e79bd36cc45aa7444e37c789ff42106b591172be25", 0x74}, {&(0x7f0000000400)="cb1143571d8011ee", 0x8}, {&(0x7f0000000440)="4c91d7a74cdb7d7dec612d402775c792302913038e3f29eb34c3c8daf0582f8d61516b5fcd0542d261efdc3c53ee42249c6a7cfbbaccc58865505be72b74a264b45eb2cfc32094fcb9299c708337502fa17055268a1aa825bdce16863bfaa9f485e0be890d04ebf7a5ae6f602025feefba391ce35af91e082154856f5d11ffaf35b45a2fd4b2503018b5b780e9cd71b4e5b532e17b7448e818691e4b6bc26cd406967a42a82f5eebe5cca58df7e68a5a619836eb009baf0743", 0xb9}, {&(0x7f0000000500)="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", 0xfb}], 0x8, &(0x7f0000000680)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x255}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0xd8}, 0x40001) socketpair(0x28, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 4: socketpair(0x23, 0x0, 0x0, 0x0) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001540)={&(0x7f0000001280)="ba02ce8f1054848be14a5299b9bfbc3379076a1fc4717255b94cfcbc9390df76084fbc9d9b0a28885093872f786223a7394dba507f4c0cc63ba4f36e0215f682d67432353a2d0ef62b36c44d27c40117c558fa73", &(0x7f0000001300)=""/137, &(0x7f00000013c0)="86a28567c78dfaf1c3edd6ff89b7ad926407e39e67935e879268f1bc0c31d48ccdcdddf70e9ada51439b82a756", &(0x7f0000001480)="1f75b57f704517c671ab0c205a653fe7455bd2a3debecfe3a7fcfe643a67150ac9ee2835a5a3ef8267890ad413d50652d8a66a4c5d431b150528155cc0fcd70e7b9e9589ca9deca4cfc1a26be92f38113407f0c7ff5566ec26e26c67b8ba3ca34d4c727fd683e3378aaa125fea3a750e69b974415197b5eb107329cce682c8c13b27b30e0de4c3b342ec696c909e6fc41e", 0x7fff, r0}, 0x38) openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 15:28:28 executing program 4: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:28 executing program 1: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000780)={&(0x7f0000000000)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x7f}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000080)="5f4bc9d0ad30278ceef632d20030dc50dfef1d5a26271605e9c0e528effed539cd7b1f3b1a1ccb56a2568cd873c0eaae57b7418bbee22f834603bd77ebc409e86c46d5cac38aa27ec850bf81f9be65da61e3bd8cb71058cce7c1dae3645f1c2432721cadaa097aaa5e62431de059b394c12da94ca2bc9199cf3e40003b9c30f573efdf3fa629526f39c1170bebc0683c66ddd8cbd69c92919722c94155567c1062966acc5198bfb8078f9f9a8d8195f2ed70c9139e873f400e120144de76fa8bbf223648b1de5eaf06831b1ac49157c1aec77e9419ad81cac666c115e57f272c838eff399c6a32", 0xe7}, {&(0x7f0000000180)="e62ebc6ef486fe700e41f44ad15bc61716d7c6b6362390e858c249fbd1bf4531e27af9a44d55dfd710b9a3019bc4855c2154e691d031fc69661d0cb9fdf0dbedb7e60c2cb19482d471fd999ef9fb3dbcbde39e349062c35bb11e570404797d3f07b5833979d831e78007c63ee5012dfeefe8bf246b8f79cb01566c6710a09ce92fbb58b0311979a68a9268ca8cd15c2fe5a69918a8f83853281af2ae813806b8d69b18545d788091ccff13a79c50304703483859a29d277e743282196c476a03fc3ac855820899270a82c875c4a20860d669c152d9a5c377b7ebb3b5678948ff06733a639e83dfe6430cb6", 0xeb}, {&(0x7f0000000280)="3f12945085ae9adb73c5000bba49e55b2220d8e9aa6565fcc55cc16bce86215b94283a585b65411d973ecdd78dc434bf60aafec6586383026521cb1c5b1dbe054a359756d3b3f49d36c998224155cd95f814b6f05b0acca1a237b8bc5717f039d6a05a184774ab83779fca3f3ba924df8ed7a8a9e9016e076177d3e7883ad9d63eda", 0x82}, {&(0x7f0000000340)="bb20d824fab72e38edcbd4f760d1ef", 0xf}, {&(0x7f0000000380)="4b7f9725287e836cfa6082111fba2de9ff9498e1a4ae33202f27e807586783c7ffb079dee7fc2231c83cc42fc260223cc9bf555b908ab52565a0f0c9fc069d330380e50a2b43dae5540944e6619ae479b47ab6d5b58c431f22044c7db6c275e79bd36cc45aa7444e37c789ff42106b591172be25", 0x74}, {&(0x7f0000000400)="cb1143571d8011ee", 0x8}, {&(0x7f0000000440)="4c91d7a74cdb7d7dec612d402775c792302913038e3f29eb34c3c8daf0582f8d61516b5fcd0542d261efdc3c53ee42249c6a7cfbbaccc58865505be72b74a264b45eb2cfc32094fcb9299c708337502fa17055268a1aa825bdce16863bfaa9f485e0be890d04ebf7a5ae6f602025feefba391ce35af91e082154856f5d11ffaf35b45a2fd4b2503018b5b780e9cd71b4e5b532e17b7448e818691e4b6bc26cd406967a42a82f5eebe5cca58df7e68a5a619836eb009baf0743", 0xb9}, {&(0x7f0000000500)="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", 0xfb}], 0x8, &(0x7f0000000680)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x255}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0xd8}, 0x40001) socketpair(0x28, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:28 executing program 5: r0 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0, r0, 0x1c}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 1: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) socketpair(0x28, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2c, 0x5, 0x0, &(0x7f0000001440)) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) 15:28:28 executing program 1: socketpair(0x28, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f0000000000)="bfe55bca7d38ab2058ccdd1d17894613b88dd0e4e13a28782dc759048d6c050c33ef74153acea1fee26478b3b0908f719c07bb6292b549f8618e31cdd10a650586eada75dc056ff35025d45b8985351e1473d08ecc9e2addafda14ed435b88ab25c0b8bb316e2faddef2a2fc5441248d54e7235f070c92aaa3f0628f93f48f6693b6855cd29ec065de3c9f50ab529188498b3c054257e2e2433ef2ede33b67944240fca9d32387d520e29ccc8f7056703370d2a9f745443df584c77e77a0e0f4cdfe198deecae82905", &(0x7f0000000100)=""/61, &(0x7f0000000140)="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", &(0x7f0000001140)="d81d6f6dc660a90851900eb68a975c50b9e45cb0191d2e0cbb1778a405dfd76b05090a94524783a2076a6ef93f1eda5b3b19e3e3d4523749ea503d6a8980fb9ac235220bc091e30bb882c411d66e6ef091f96e9e0cec8bf9ceed645bd1b2512593c6d31e075d5f62f4f930ee2705a7a9513f8e3e2c2303e7f7af1ad5e27da52f42861fb395fa1b0d6c98b2d1a4767d71dd1c929f3feac0ec98519c42d72fc8161de9ff42fefab6770c1b048744477d88edf5a7b996ebf43d037593b80aa995f71b3619b4440011e6a3ef0a7e54e7af46b2ebc3baa0c023014031124d9035cca5803aed28e17948dd255a6c", 0x2000, 0x1}, 0x38) openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) 15:28:28 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2c, 0x5, 0x0, &(0x7f0000001440)) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 1: socketpair(0x0, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 5: bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffe4f) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 2: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x22, 0x0, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)) socketpair(0x9, 0x1, 0x9, &(0x7f00000012c0)) recvmsg$kcm(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000080)=""/75, 0x4b}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/50, 0x32}], 0x3, &(0x7f0000001180)=""/108, 0x6c}, 0x10001) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001240)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000001280)={r2}) 15:28:28 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2c, 0x5, 0x0, &(0x7f0000001440)) 15:28:28 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x442, 0x0) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 2: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000), 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000040)=r0, 0x4) 15:28:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 4: socketpair(0x2c, 0x5, 0x0, &(0x7f0000001440)) 15:28:28 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x442, 0x0) 15:28:28 executing program 1: socketpair(0x0, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 2: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:28 executing program 4: socketpair(0x0, 0x5, 0x0, &(0x7f0000001440)) 15:28:28 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x442, 0x0) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 1: socketpair(0x0, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x442, 0x0) 15:28:28 executing program 2: socketpair(0x0, 0xa, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x0, 0x0) 15:28:28 executing program 4: socketpair(0x0, 0x5, 0x0, &(0x7f0000001440)) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 1: socketpair(0x28, 0x0, 0x6, &(0x7f00000007c0)) 15:28:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x0, 0x0) 15:28:28 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:28 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:28 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f00000007c0)) 15:28:28 executing program 4: socketpair(0x0, 0x5, 0x0, &(0x7f0000001440)) 15:28:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001580), 0x0, 0x0) 15:28:29 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/27, 0x1b}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 1: socketpair(0x28, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x1) 15:28:29 executing program 4: socketpair(0x2c, 0x0, 0x0, &(0x7f0000001440)) 15:28:29 executing program 1: socketpair(0x28, 0x0, 0x6, 0x0) 15:28:29 executing program 4: socketpair(0x2c, 0x0, 0x0, 0x0) 15:28:29 executing program 0: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x1) 15:28:29 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 1: socketpair(0x28, 0x0, 0x6, 0x0) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 4: socketpair(0x2c, 0x0, 0x0, 0x0) 15:28:29 executing program 1: socketpair(0x28, 0x0, 0x6, 0x0) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, 0x0, 0x1) 15:28:29 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 0: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 4: socketpair(0x2c, 0x0, 0x0, 0x0) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:29 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc810, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f00000007c0)) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000001c0)=[{}], 0x8, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', r0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 0: socketpair(0xf, 0x3, 0x0, &(0x7f0000001440)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 2: socketpair(0x28, 0x0, 0x0, 0x0) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 2: socketpair(0x28, 0x0, 0x0, 0x0) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, &(0x7f0000000140)=""/78, 0x4e}, 0x1) 15:28:29 executing program 1: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 2: socketpair(0x28, 0x0, 0x0, 0x0) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x1) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:28:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 2: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0xc810, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:29 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 2: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x39, 0xc810, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:29 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:30 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:30 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:30 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 15:28:30 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:30 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:30 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:28:30 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:30 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000040)={r1}) 15:28:30 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000040)={r1}) 15:28:30 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:30 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:30 executing program 2: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x4, 0x9, 0x0, 0x39, 0xc810, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) 15:28:31 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000040)={r1}) 15:28:31 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@generic={0x6, 0x3, 0x4, 0x6, 0x10001}]}, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:31 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:31 executing program 2: socketpair(0xf, 0x800, 0x7, &(0x7f0000001440)) r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x19, 0x0, 0x4, 0x9, 0x0, 0x39, 0xc810, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, r0, 0x1, 0xffffffffffffffff, 0x0) 15:28:31 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:31 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) 15:28:31 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:31 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:31 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:31 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) sendmsg$sock(r2, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x428, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={0x0}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x72, &(0x7f0000000080)=""/114, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x0, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={0x0}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x5, 0x6, 0x410000eb, &(0x7f0000000000)) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={0x0}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0xf, 0x0, 0x0, &(0x7f0000001440)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x0, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x0, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={0x0}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x0, 0x8}, 0x10}, 0x80) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x0, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="aa69b90c42b7a1cc457968debeba25d86bc726802a242f8e8ee2518928a15159ad27c412254e0d7378d6976b32c9f92d5c4bc9a7cf87546e615d6c118292846037e756215750219dfd601e988a30add4e0b805b419722ae142006afb544edade5e8bb163a94ad34c6781d5a1162d3f2e350b2fb9423c865ad836280937b0138f84ea789edb93982235435500337b8a3e5c9f203c20ba2cc9147e697d020509f1ca63b687b3050d38b23e50192d0bfd29efca3d1d63ffdfcd04aabf1a80beb91f42f9b86a45066f52537faa660c2056487e3d9e8e32dae96c6f3d1ac9554e5150785d4fa7977b78a621e01ab194ae18c3d1d8e6bf5e467e", 0xf7}, {&(0x7f0000000180)="b8e3c37a671cad62c66e6014c8420fe99e43406a83e541d0fa9275eb9ebcfc7d286be6f226724358a71294943afab55aea7a3d16921dfc3315225cfa97c7a3f6ec8c274923565a9b2b206208ce12ed03a9ee213b3f0022c09988a8bdc0df338e6f16c0dde16f62fc1cfbc9a59c0f8725286579a669ccd20e66ddecdef1b41188e0af07ab945735fe4d7aab7c69122ea02a8bd5d61023c373efe86205fc3155e415f3ced6d729e17fbf9a16d9c0fd3a5b", 0xb0}, {&(0x7f0000000240)="729658f2ba82bef5b6", 0x9}, {&(0x7f0000000280)="10a342954d7b886f51ee22a511df9110e35e0d99bbbcff16ca4e66d47549d7866ff48f35b8086bf4d89057b31e2bd118e2428f92b194548de13cb861aacc810048adb34479c6e0e2578c9d9f4f699effd7f7c46fe269864375b6d008b962189baa8df22eb96ea6974785303215d6a478339fbe5832908445d13840cd4ad2685381dda1960ce5daf49b9d6c35cb885a21953f4cd8712ee4507e4454cfc42be8a6b50d88b0ae33e969dccddb40498906599c6c2dd1e5b64c37897c471ff9332bf2d8af5006caff17f497", 0xc9}, {&(0x7f0000000380)="fa51698aa9f3137800d8f0a3ffa51c0100ebca6f9ab1ad1d5936470a1994473983a2fa92737ca0237babb8", 0x2b}, {&(0x7f00000003c0)="d80c41bb02fda4561e96e451f5e3a31d2c09c902e8099eb2ba70d47bb1939e0a315e2c6cb8c839ec96bdad4a41e98e692af96d", 0x33}, {&(0x7f0000000400)="db70270bbff6640b1515b011e0e73f50815f44949ba25fb74469", 0x1a}, {&(0x7f0000000440)="e37ebf5161dbbf42a2b5ab2074f09c7e1c6d49bff178822802ab80fce0fcd6770bb69845109a128502ece335d5b80a1c8145e292fdf50da98209e19479cfbc46f1f3486e32724faed0b6b3db5bfbb3b433470ad97803c73f8edc4716eca56898073ad145f94ef3349474ba636e42c6", 0x6f}], 0x8, &(0x7f0000000540)=[@ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0x9f, [@multicast2, @loopback, @multicast1, @local, @private=0xa010102, @remote, @private=0xa010100, @remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @broadcast}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@rr={0x7, 0x7, 0xed, [@remote]}, @lsrr={0x83, 0xf, 0x7b, [@multicast2, @empty, @remote]}, @cipso={0x86, 0x6, 0x3}, @rr={0x7, 0x2b, 0xc2, [@private=0xa010100, @loopback, @multicast1, @empty, @local, @multicast2, @private=0xa010100, @multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x2c}]}, @ssrr={0x89, 0x7, 0xf0, [@broadcast]}, @end, @timestamp={0x44, 0x1c, 0x98, 0x0, 0x8, [0x5, 0x100, 0x765, 0xffffffff, 0x7, 0x6]}, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe058}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @rand_addr=0x64010102}}}], 0x128}, 0x20000) recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2a, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:32 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:32 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x0, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:32 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="aa69b90c42b7a1cc457968debeba25d86bc726802a242f8e8ee2518928a15159ad27c412254e0d7378d6976b32c9f92d5c4bc9a7cf87546e615d6c118292846037e756215750219dfd601e988a30add4e0b805b419722ae142006afb544edade5e8bb163a94ad34c6781d5a1162d3f2e350b2fb9423c865ad836280937b0138f84ea789edb93982235435500337b8a3e5c9f203c20ba2cc9147e697d020509f1ca63b687b3050d38b23e50192d0bfd29efca3d1d63ffdfcd04aabf1a80beb91f42f9b86a45066f52537faa660c2056487e3d9e8e32dae96c6f3d1ac9554e5150785d4fa7977b78a621e01ab194ae18c3d1d8e6bf5e467e", 0xf7}, {&(0x7f0000000180)="b8e3c37a671cad62c66e6014c8420fe99e43406a83e541d0fa9275eb9ebcfc7d286be6f226724358a71294943afab55aea7a3d16921dfc3315225cfa97c7a3f6ec8c274923565a9b2b206208ce12ed03a9ee213b3f0022c09988a8bdc0df338e6f16c0dde16f62fc1cfbc9a59c0f8725286579a669ccd20e66ddecdef1b41188e0af07ab945735fe4d7aab7c69122ea02a8bd5d61023c373efe86205fc3155e415f3ced6d729e17fbf9a16d9c0fd3a5b", 0xb0}, {&(0x7f0000000240)="729658f2ba82bef5b6", 0x9}, {&(0x7f0000000280)="10a342954d7b886f51ee22a511df9110e35e0d99bbbcff16ca4e66d47549d7866ff48f35b8086bf4d89057b31e2bd118e2428f92b194548de13cb861aacc810048adb34479c6e0e2578c9d9f4f699effd7f7c46fe269864375b6d008b962189baa8df22eb96ea6974785303215d6a478339fbe5832908445d13840cd4ad2685381dda1960ce5daf49b9d6c35cb885a21953f4cd8712ee4507e4454cfc42be8a6b50d88b0ae33e969dccddb40498906599c6c2dd1e5b64c37897c471ff9332bf2d8af5006caff17f497", 0xc9}, {&(0x7f0000000380)="fa51698aa9f3137800d8f0a3ffa51c0100ebca6f9ab1ad1d5936470a1994473983a2fa92737ca0237babb8", 0x2b}, {&(0x7f00000003c0)="d80c41bb02fda4561e96e451f5e3a31d2c09c902e8099eb2ba70d47bb1939e0a315e2c6cb8c839ec96bdad4a41e98e692af96d", 0x33}, {&(0x7f0000000400)="db70270bbff6640b1515b011e0e73f50815f44949ba25fb74469", 0x1a}, {&(0x7f0000000440)="e37ebf5161dbbf42a2b5ab2074f09c7e1c6d49bff178822802ab80fce0fcd6770bb69845109a128502ece335d5b80a1c8145e292fdf50da98209e19479cfbc46f1f3486e32724faed0b6b3db5bfbb3b433470ad97803c73f8edc4716eca56898073ad145f94ef3349474ba636e42c6", 0x6f}], 0x8, &(0x7f0000000540)=[@ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0x9f, [@multicast2, @loopback, @multicast1, @local, @private=0xa010102, @remote, @private=0xa010100, @remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @broadcast}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@rr={0x7, 0x7, 0xed, [@remote]}, @lsrr={0x83, 0xf, 0x7b, [@multicast2, @empty, @remote]}, @cipso={0x86, 0x6, 0x3}, @rr={0x7, 0x2b, 0xc2, [@private=0xa010100, @loopback, @multicast1, @empty, @local, @multicast2, @private=0xa010100, @multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x2c}]}, @ssrr={0x89, 0x7, 0xf0, [@broadcast]}, @end, @timestamp={0x44, 0x1c, 0x98, 0x0, 0x8, [0x5, 0x100, 0x765, 0xffffffff, 0x7, 0x6]}, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe058}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @rand_addr=0x64010102}}}], 0x128}, 0x20000) recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2a, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x0, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="aa69b90c42b7a1cc457968debeba25d86bc726802a242f8e8ee2518928a15159ad27c412254e0d7378d6976b32c9f92d5c4bc9a7cf87546e615d6c118292846037e756215750219dfd601e988a30add4e0b805b419722ae142006afb544edade5e8bb163a94ad34c6781d5a1162d3f2e350b2fb9423c865ad836280937b0138f84ea789edb93982235435500337b8a3e5c9f203c20ba2cc9147e697d020509f1ca63b687b3050d38b23e50192d0bfd29efca3d1d63ffdfcd04aabf1a80beb91f42f9b86a45066f52537faa660c2056487e3d9e8e32dae96c6f3d1ac9554e5150785d4fa7977b78a621e01ab194ae18c3d1d8e6bf5e467e", 0xf7}, {&(0x7f0000000180)="b8e3c37a671cad62c66e6014c8420fe99e43406a83e541d0fa9275eb9ebcfc7d286be6f226724358a71294943afab55aea7a3d16921dfc3315225cfa97c7a3f6ec8c274923565a9b2b206208ce12ed03a9ee213b3f0022c09988a8bdc0df338e6f16c0dde16f62fc1cfbc9a59c0f8725286579a669ccd20e66ddecdef1b41188e0af07ab945735fe4d7aab7c69122ea02a8bd5d61023c373efe86205fc3155e415f3ced6d729e17fbf9a16d9c0fd3a5b", 0xb0}, {&(0x7f0000000240)="729658f2ba82bef5b6", 0x9}, {&(0x7f0000000280)="10a342954d7b886f51ee22a511df9110e35e0d99bbbcff16ca4e66d47549d7866ff48f35b8086bf4d89057b31e2bd118e2428f92b194548de13cb861aacc810048adb34479c6e0e2578c9d9f4f699effd7f7c46fe269864375b6d008b962189baa8df22eb96ea6974785303215d6a478339fbe5832908445d13840cd4ad2685381dda1960ce5daf49b9d6c35cb885a21953f4cd8712ee4507e4454cfc42be8a6b50d88b0ae33e969dccddb40498906599c6c2dd1e5b64c37897c471ff9332bf2d8af5006caff17f497", 0xc9}, {&(0x7f0000000380)="fa51698aa9f3137800d8f0a3ffa51c0100ebca6f9ab1ad1d5936470a1994473983a2fa92737ca0237babb8", 0x2b}, {&(0x7f00000003c0)="d80c41bb02fda4561e96e451f5e3a31d2c09c902e8099eb2ba70d47bb1939e0a315e2c6cb8c839ec96bdad4a41e98e692af96d", 0x33}, {&(0x7f0000000400)="db70270bbff6640b1515b011e0e73f50815f44949ba25fb74469", 0x1a}, {&(0x7f0000000440)="e37ebf5161dbbf42a2b5ab2074f09c7e1c6d49bff178822802ab80fce0fcd6770bb69845109a128502ece335d5b80a1c8145e292fdf50da98209e19479cfbc46f1f3486e32724faed0b6b3db5bfbb3b433470ad97803c73f8edc4716eca56898073ad145f94ef3349474ba636e42c6", 0x6f}], 0x8, &(0x7f0000000540)=[@ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0x9f, [@multicast2, @loopback, @multicast1, @local, @private=0xa010102, @remote, @private=0xa010100, @remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @broadcast}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@rr={0x7, 0x7, 0xed, [@remote]}, @lsrr={0x83, 0xf, 0x7b, [@multicast2, @empty, @remote]}, @cipso={0x86, 0x6, 0x3}, @rr={0x7, 0x2b, 0xc2, [@private=0xa010100, @loopback, @multicast1, @empty, @local, @multicast2, @private=0xa010100, @multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x2c}]}, @ssrr={0x89, 0x7, 0xf0, [@broadcast]}, @end, @timestamp={0x44, 0x1c, 0x98, 0x0, 0x8, [0x5, 0x100, 0x765, 0xffffffff, 0x7, 0x6]}, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe058}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @rand_addr=0x64010102}}}], 0x128}, 0x20000) recvmsg(0xffffffffffffffff, &(0x7f0000001300)={0x0, 0x0, 0x0}, 0x0) socketpair(0x2a, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x0, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)="aa69b90c42b7a1cc457968debeba25d86bc726802a242f8e8ee2518928a15159ad27c412254e0d7378d6976b32c9f92d5c4bc9a7cf87546e615d6c118292846037e756215750219dfd601e988a30add4e0b805b419722ae142006afb544edade5e8bb163a94ad34c6781d5a1162d3f2e350b2fb9423c865ad836280937b0138f84ea789edb93982235435500337b8a3e5c9f203c20ba2cc9147e697d020509f1ca63b687b3050d38b23e50192d0bfd29efca3d1d63ffdfcd04aabf1a80beb91f42f9b86a45066f52537faa660c2056487e3d9e8e32dae96c6f3d1ac9554e5150785d4fa7977b78a621e01ab194ae18c3d1d8e6bf5e467e", 0xf7}, {&(0x7f0000000180)="b8e3c37a671cad62c66e6014c8420fe99e43406a83e541d0fa9275eb9ebcfc7d286be6f226724358a71294943afab55aea7a3d16921dfc3315225cfa97c7a3f6ec8c274923565a9b2b206208ce12ed03a9ee213b3f0022c09988a8bdc0df338e6f16c0dde16f62fc1cfbc9a59c0f8725286579a669ccd20e66ddecdef1b41188e0af07ab945735fe4d7aab7c69122ea02a8bd5d61023c373efe86205fc3155e415f3ced6d729e17fbf9a16d9c0fd3a5b", 0xb0}, {&(0x7f0000000240)="729658f2ba82bef5b6", 0x9}, {&(0x7f0000000280)="10a342954d7b886f51ee22a511df9110e35e0d99bbbcff16ca4e66d47549d7866ff48f35b8086bf4d89057b31e2bd118e2428f92b194548de13cb861aacc810048adb34479c6e0e2578c9d9f4f699effd7f7c46fe269864375b6d008b962189baa8df22eb96ea6974785303215d6a478339fbe5832908445d13840cd4ad2685381dda1960ce5daf49b9d6c35cb885a21953f4cd8712ee4507e4454cfc42be8a6b50d88b0ae33e969dccddb40498906599c6c2dd1e5b64c37897c471ff9332bf2d8af5006caff17f497", 0xc9}, {&(0x7f0000000380)="fa51698aa9f3137800d8f0a3ffa51c0100ebca6f9ab1ad1d5936470a1994473983a2fa92737ca0237babb8", 0x2b}, {&(0x7f00000003c0)="d80c41bb02fda4561e96e451f5e3a31d2c09c902e8099eb2ba70d47bb1939e0a315e2c6cb8c839ec96bdad4a41e98e692af96d", 0x33}, {&(0x7f0000000400)="db70270bbff6640b1515b011e0e73f50815f44949ba25fb74469", 0x1a}, {&(0x7f0000000440)="e37ebf5161dbbf42a2b5ab2074f09c7e1c6d49bff178822802ab80fce0fcd6770bb69845109a128502ece335d5b80a1c8145e292fdf50da98209e19479cfbc46f1f3486e32724faed0b6b3db5bfbb3b433470ad97803c73f8edc4716eca56898073ad145f94ef3349474ba636e42c6", 0x6f}], 0x8, &(0x7f0000000540)=[@ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x23, 0x9f, [@multicast2, @loopback, @multicast1, @local, @private=0xa010102, @remote, @private=0xa010100, @remote]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @broadcast}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@rr={0x7, 0x7, 0xed, [@remote]}, @lsrr={0x83, 0xf, 0x7b, [@multicast2, @empty, @remote]}, @cipso={0x86, 0x6, 0x3}, @rr={0x7, 0x2b, 0xc2, [@private=0xa010100, @loopback, @multicast1, @empty, @local, @multicast2, @private=0xa010100, @multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x2c}]}, @ssrr={0x89, 0x7, 0xf0, [@broadcast]}, @end, @timestamp={0x44, 0x1c, 0x98, 0x0, 0x8, [0x5, 0x100, 0x765, 0xffffffff, 0x7, 0x6]}, @ra={0x94, 0x4, 0x1}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe058}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @rand_addr=0x64010102}}}], 0x128}, 0x20000) socketpair(0x2a, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x0, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x2a, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x0, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: socketpair(0x2a, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x0, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:28:33 executing program 2: socketpair(0x0, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x0, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x0, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4a21, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 15:28:33 executing program 2: socketpair(0x0, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x0, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x8000) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x8000) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x0, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: socketpair(0x0, 0x0, 0xfffffffc, &(0x7f0000000040)) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x8000) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x0, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x0, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 2: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000040)) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 2: socketpair(0x2a, 0x0, 0x0, 0x0) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 2: socketpair(0x2a, 0x0, 0x0, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000000)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: socketpair(0x2a, 0x0, 0x0, 0x0) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x4, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}, {&(0x7f0000000300)="8bff620728889642e9e6d9f1366c67df333e68d71e12689d5129c259a7f978b67e191e7f7bdea4bde0a1bce3bbe3c6ce954e4b8b2080937a9949602635418cb1ac60583152c82dd1c2abc5fb7788a3fe7852cf3e899ef56792bac47f39c50524bdcef7317d4fdb7a03d4d2fa3d95da3fb55b66fd7520c4e859bc1f9cf851636c961bed92f06b496e4d0f1ce42957dca8e64d2453cbcb448d171cd7a03cbcae7a51f40d9d6ee076cc9e500e03685c49d95829568ba091a9ad55c650eb3828f6efafcae4f1c02e91cfa8532fafea", 0xcd}], 0x4}, 0x8000) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, 0x0}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, 0x0}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, 0x0}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}, {&(0x7f0000000200)="5fa865c3284c2abeba544e16023ca7431daf06ed193ddcbfc9938a62130a711a4f9da181746c16bb3892f8afb786c51b1d7c24afa298d92b6d8ab269d1ae12f01f5ffe23277751be68557ca439da247bc2dac763b6f8976e6d872aa57e50d3239878cf71cd869b67f5d4a0d2c97e7e5e2511e4241abd31868d3c3c70fd622e902b9b5f14321e17975721501be23f701638dc94d62c9004124c894ae41df9965cfd2d2d1e9de7eb9b36317c0cc266903f93d63328bbca5e29d49e98bfe999c5cb406ac59df7a25fd4b7", 0xc9}], 0x3}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8fb405b3692fb062fafbbcf334cce82beedf2", 0x24}], 0x2}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}], 0x1}, 0x8000) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}], 0x1}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}], 0x1}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {0x0}], 0x2}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {0x0}], 0x2}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {0x0}], 0x2}, 0x8000) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c41bb3980581da230e8", 0x12}], 0x2}, 0x8000) 15:28:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, 0x0, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, 0x0, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, 0x0, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, 0x0, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, 0x0, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec70ecd52c", 0x9}], 0x2}, 0x8000) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r2, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, 0x0, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)="4ed83472ec", 0x5}], 0x2}, 0x8000) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:35 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee8336662ec8d7ef2caa", 0xd}, {&(0x7f00000001c0)}], 0x2}, 0x8000) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)='N', 0x1}], 0x1}, 0x8000) 15:28:35 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)='N', 0x1}], 0x1}, 0x8000) 15:28:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000001c0)='N', 0x1}], 0x1}, 0x8000) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{0x0}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{0x0}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{0x0}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee833666", 0x7}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9", 0x1}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) [ 167.803527][ C1] hrtimer: interrupt took 33814 ns 15:28:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:37 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9", 0x1}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x0) 15:28:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9", 0x1}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x0) 15:28:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9", 0x1}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x0) 15:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9", 0x1}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x0) 15:28:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 15:28:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 15:28:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) 15:28:37 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:37 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:37 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) 15:28:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 15:28:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 15:28:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) 15:28:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffff74}, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) 15:28:38 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000a00), 0x4) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x101, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)="c9d551ee833666", 0x7}, {&(0x7f00000001c0)='N', 0x1}], 0x2}, 0x8000) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 15:28:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x9) 15:28:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 15:28:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:41 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 15:28:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:41 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:41 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) 15:28:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:41 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) 15:28:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:42 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:42 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)) 15:28:42 executing program 4: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) 15:28:42 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) 15:28:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 15:28:42 executing program 0: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 15:28:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 15:28:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:43 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:44 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:44 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) [ 170.483195][ T3623] Bluetooth: hci2: command 0x0406 tx timeout [ 170.489269][ T3623] Bluetooth: hci5: command 0x0406 tx timeout [ 170.495907][ T3632] Bluetooth: hci1: command 0x0406 tx timeout [ 170.496000][ T3635] Bluetooth: hci0: command 0x0406 tx timeout [ 170.501901][ T3632] Bluetooth: hci3: command 0x0406 tx timeout [ 170.507971][ T3629] Bluetooth: hci4: command 0x0406 tx timeout 15:28:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:45 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 1: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:45 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 2: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 5: perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:47 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:28:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:49 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x0, 0x0, &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:52 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x0, 0x0, &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 15:28:52 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.cpu/syz0\x00', 0x1ff) socketpair(0x1d, 0x1, 0xc0000000, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x6, 0x1, 0xb, 0x1, 0x0, 0xffffffffffffffa3, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xab, 0x2, @perf_bp={&(0x7f0000000a40)}, 0x1000, 0x9, 0x20, 0x6, 0x80000001, 0x41b0, 0xfff8, 0x0, 0x3, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}], 0x20, 0x0, 0x0, &(0x7f0000000180), 0x8, 0x10, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="185b0004000000000000000000000000183b000005000000000000000000000018000000000000000005000000ca40cbadf086a28206b7c709c359288bb6723d2d3ff8a6bfc279787b8017e1ebbfbef7621ec6fffc07461ee194ef3fc5e306b617e386b822736a978d93ef955295a6973aff5bfecb5260aaf84f5fa6c55777619e0f46f2dca44cbd89d1cc25302d4b08e2d03b00ac1b9ed9e2c18bd9edc1c4770581a644bca43874ae90f7e2f40a53b8f6c5bc693a89a5b729388c0236a2368462c320e8f16b3c5315a54ba6bf86962dff442b777b54a6b80a7fa7b5500e9b0f915aabdb9cfddb4dc6f38fe5e23ce00256390a4bd9c1db267d981b786ac16d9aa418c0e95dc4ef5ea0b40ebd5dac5ff7c87deb864deaf7c679a4f28fa6442b50672b7dbb9c192f916014090a34b03de39b7c96c3dcd30af0e83193c436efa9c314ee4f486bafd5a7764bc442f501b62fd4f01c4eb728e10416a74f7e8701e7f8b9e65d"], &(0x7f0000000880)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x21780, 0x1a, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000900)={0x5, 0xb, 0xb7b, 0x3}, 0x10, 0x2e68c, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000a00)=r3, 0x4) sendmsg$sock(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@ll={0x11, 0x4, r2, 0x1, 0x52, 0x6, @local}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="624eab3085f7b8e0f29444e22c4816ddbd2c8eebcc30c700", 0x18}], 0x1, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @mark={{0x0, 0x1, 0x24, 0x8}}, @mark={{0x0, 0x1, 0x24, 0x3}}], 0x48}, 0x4040084) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000540)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}], 0x8, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) 15:28:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) [ 184.098494][T19084] ================================================================== [ 184.106603][T19084] BUG: KASAN: use-after-free in task_work_run+0x1b0/0x270 [ 184.113755][T19084] Read of size 8 at addr ffff88807e2aade8 by task syz-executor.0/19084 [ 184.122009][T19084] [ 184.124374][T19084] CPU: 1 PID: 19084 Comm: syz-executor.0 Not tainted 6.1.0-rc2-syzkaller-00073-g88619e77b33d #0 [ 184.134803][T19084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 184.144870][T19084] Call Trace: [ 184.148153][T19084] [ 184.151092][T19084] dump_stack_lvl+0xcd/0x134 [ 184.155707][T19084] print_report+0x15e/0x45d [ 184.160225][T19084] ? __phys_addr+0xc4/0x140 [ 184.164741][T19084] ? task_work_run+0x1b0/0x270 [ 184.169534][T19084] kasan_report+0xbb/0x1f0 [ 184.173976][T19084] ? task_work_run+0x1b0/0x270 [ 184.178768][T19084] task_work_run+0x1b0/0x270 [ 184.183393][T19084] ? task_work_cancel+0x30/0x30 [ 184.188270][T19084] ? do_raw_spin_unlock+0x171/0x230 [ 184.193489][T19084] do_exit+0xb35/0x2a20 [ 184.197660][T19084] ? rcu_read_lock_sched_held+0xd/0x70 [ 184.203134][T19084] ? mm_update_next_owner+0x7b0/0x7b0 [ 184.208520][T19084] do_group_exit+0xd0/0x2a0 [ 184.213034][T19084] get_signal+0x21a1/0x2430 [ 184.217555][T19084] ? exit_signals+0x8b0/0x8b0 [ 184.222251][T19084] arch_do_signal_or_restart+0x82/0x2300 [ 184.227896][T19084] ? __do_sys_perf_event_open+0xcf/0x32d0 [ 184.233645][T19084] ? get_sigframe_size+0x10/0x10 [ 184.238592][T19084] ? perf_event_set_output+0x5b0/0x5b0 [ 184.244075][T19084] ? lock_downgrade+0x6e0/0x6e0 [ 184.248947][T19084] exit_to_user_mode_prepare+0x15f/0x250 [ 184.254596][T19084] syscall_exit_to_user_mode+0x19/0x50 [ 184.260071][T19084] do_syscall_64+0x42/0xb0 [ 184.264509][T19084] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 184.270429][T19084] RIP: 0033:0x7f0b3b28b5a9 [ 184.274854][T19084] Code: Unable to access opcode bytes at 0x7f0b3b28b57f. [ 184.281871][T19084] RSP: 002b:00007f0b3bf57168 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 184.290296][T19084] RAX: 0000000000000003 RBX: 00007f0b3b3abf80 RCX: 00007f0b3b28b5a9 [ 184.298279][T19084] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000020000080 [ 184.306255][T19084] RBP: 00007f0b3b2e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 184.314233][T19084] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 184.322213][T19084] R13: 00007ffd90b1e98f R14: 00007f0b3bf57300 R15: 0000000000022000 [ 184.330198][T19084] [ 184.333223][T19084] [ 184.335545][T19084] Allocated by task 19084: [ 184.339958][T19084] kasan_save_stack+0x1e/0x40 [ 184.344657][T19084] kasan_set_track+0x21/0x30 [ 184.349262][T19084] __kasan_slab_alloc+0x7e/0x80 [ 184.354131][T19084] kmem_cache_alloc_node+0x2fc/0x400 [ 184.359431][T19084] perf_event_alloc.part.0+0x69/0x3bc0 [ 184.364909][T19084] __do_sys_perf_event_open+0x4ae/0x32d0 [ 184.370562][T19084] do_syscall_64+0x35/0xb0 [ 184.375001][T19084] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 184.380912][T19084] [ 184.383233][T19084] Freed by task 19091: [ 184.387314][T19084] kasan_save_stack+0x1e/0x40 [ 184.392014][T19084] kasan_set_track+0x21/0x30 [ 184.396624][T19084] kasan_save_free_info+0x2a/0x40 [ 184.401657][T19084] ____kasan_slab_free+0x160/0x1c0 [ 184.406787][T19084] slab_free_freelist_hook+0x8b/0x1c0 [ 184.412175][T19084] kmem_cache_free+0xea/0x5b0 [ 184.416871][T19084] rcu_core+0x81f/0x1980 [ 184.421131][T19084] __do_softirq+0x1f7/0xad8 [ 184.425658][T19084] [ 184.427977][T19084] Last potentially related work creation: [ 184.433687][T19084] kasan_save_stack+0x1e/0x40 [ 184.438382][T19084] __kasan_record_aux_stack+0xbc/0xd0 [ 184.443777][T19084] call_rcu+0x99/0x820 [ 184.447859][T19084] perf_event_release_kernel+0x6f2/0x940 [ 184.453511][T19084] perf_release+0x33/0x40 [ 184.457858][T19084] __fput+0x27c/0xa90 [ 184.461849][T19084] task_work_run+0x16b/0x270 [ 184.466465][T19084] do_exit+0xb35/0x2a20 [ 184.470629][T19084] do_group_exit+0xd0/0x2a0 [ 184.475141][T19084] get_signal+0x21a1/0x2430 [ 184.479653][T19084] arch_do_signal_or_restart+0x82/0x2300 [ 184.485296][T19084] exit_to_user_mode_prepare+0x15f/0x250 [ 184.490947][T19084] syscall_exit_to_user_mode+0x19/0x50 [ 184.496417][T19084] do_syscall_64+0x42/0xb0 [ 184.500852][T19084] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 184.506764][T19084] [ 184.509089][T19084] Second to last potentially related work creation: [ 184.515667][T19084] kasan_save_stack+0x1e/0x40 [ 184.520362][T19084] __kasan_record_aux_stack+0xbc/0xd0 [ 184.525757][T19084] task_work_add+0x7b/0x2c0 [ 184.530284][T19084] event_sched_out+0xe35/0x1190 [ 184.535158][T19084] __perf_remove_from_context+0x87/0xc40 [ 184.540820][T19084] event_function+0x29e/0x3e0 [ 184.545518][T19084] remote_function+0x11e/0x1a0 [ 184.550294][T19084] __flush_smp_call_function_queue+0x205/0x9a0 [ 184.556487][T19084] __sysvec_call_function_single+0xca/0x4d0 [ 184.562409][T19084] sysvec_call_function_single+0x8e/0xc0 [ 184.568063][T19084] asm_sysvec_call_function_single+0x16/0x20 [ 184.574065][T19084] [ 184.576390][T19084] The buggy address belongs to the object at ffff88807e2aa990 [ 184.576390][T19084] which belongs to the cache perf_event of size 1392 [ 184.590459][T19084] The buggy address is located 1112 bytes inside of [ 184.590459][T19084] 1392-byte region [ffff88807e2aa990, ffff88807e2aaf00) [ 184.603916][T19084] [ 184.606223][T19084] The buggy address belongs to the physical page: [ 184.612641][T19084] page:ffffea0001f8aa00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88807e2a85f0 pfn:0x7e2a8 [ 184.624079][T19084] head:ffffea0001f8aa00 order:3 compound_mapcount:0 compound_pincount:0 [ 184.632384][T19084] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 184.640349][T19084] raw: 00fff00000010200 0000000000000000 dead000000000001 ffff8880118c23c0 [ 184.648916][T19084] raw: ffff88807e2a85f0 0000000080150011 00000001ffffffff 0000000000000000 [ 184.657476][T19084] page dumped because: kasan: bad access detected [ 184.663866][T19084] page_owner tracks the page as allocated [ 184.669565][T19084] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 13307, tgid 13290 (syz-executor.0), ts 121663722404, free_ts 121648618580 [ 184.692850][T19084] get_page_from_freelist+0x10b5/0x2d50 [ 184.698388][T19084] __alloc_pages+0x1c7/0x5a0 [ 184.702959][T19084] allocate_slab+0x80/0x300 [ 184.707460][T19084] ___slab_alloc+0xa91/0x1400 [ 184.712121][T19084] __slab_alloc.constprop.0+0x56/0xa0 [ 184.717478][T19084] kmem_cache_alloc_node+0x189/0x400 [ 184.722747][T19084] perf_event_alloc.part.0+0x69/0x3bc0 [ 184.728201][T19084] __do_sys_perf_event_open+0x4ae/0x32d0 [ 184.733832][T19084] do_syscall_64+0x35/0xb0 [ 184.738240][T19084] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 184.744133][T19084] page last free stack trace: [ 184.748806][T19084] free_pcp_prepare+0x65c/0xd90 [ 184.753657][T19084] free_unref_page+0x19/0x4d0 [ 184.758318][T19084] __unfreeze_partials+0x17c/0x1a0 [ 184.763417][T19084] qlist_free_all+0x6a/0x170 [ 184.767991][T19084] kasan_quarantine_reduce+0x180/0x200 [ 184.773436][T19084] __kasan_slab_alloc+0x62/0x80 [ 184.778278][T19084] kmem_cache_alloc+0x2ac/0x3c0 [ 184.783117][T19084] __anon_vma_prepare+0x60/0x580 [ 184.788038][T19084] __handle_mm_fault+0x35bc/0x3a40 [ 184.793135][T19084] handle_mm_fault+0x1c8/0x780 [ 184.797887][T19084] do_user_addr_fault+0x475/0x1210 [ 184.802987][T19084] exc_page_fault+0x94/0x170 [ 184.807672][T19084] asm_exc_page_fault+0x22/0x30 [ 184.812629][T19084] [ 184.814950][T19084] Memory state around the buggy address: [ 184.820572][T19084] ffff88807e2aac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.828616][T19084] ffff88807e2aad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.836661][T19084] >ffff88807e2aad80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.844699][T19084] ^ [ 184.852132][T19084] ffff88807e2aae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.860175][T19084] ffff88807e2aae80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 184.868213][T19084] ================================================================== [ 184.917311][T19084] Kernel panic - not syncing: panic_on_warn set ... [ 184.923935][T19084] CPU: 1 PID: 19084 Comm: syz-executor.0 Not tainted 6.1.0-rc2-syzkaller-00073-g88619e77b33d #0 [ 184.934358][T19084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 184.944410][T19084] Call Trace: [ 184.947686][T19084] [ 184.950601][T19084] dump_stack_lvl+0xcd/0x134 [ 184.955188][T19084] panic+0x2c8/0x622 [ 184.959076][T19084] ? panic_print_sys_info.part.0+0x110/0x110 [ 184.965046][T19084] ? preempt_schedule_common+0x59/0xc0 [ 184.970498][T19084] ? preempt_schedule_thunk+0x16/0x18 [ 184.975862][T19084] end_report.part.0+0x3f/0x7c [ 184.980614][T19084] ? task_work_run+0x1b0/0x270 [ 184.985372][T19084] kasan_report.cold+0xa/0xf [ 184.989949][T19084] ? task_work_run+0x1b0/0x270 [ 184.994725][T19084] task_work_run+0x1b0/0x270 [ 184.999349][T19084] ? task_work_cancel+0x30/0x30 [ 185.004232][T19084] ? do_raw_spin_unlock+0x171/0x230 [ 185.009451][T19084] do_exit+0xb35/0x2a20 [ 185.013610][T19084] ? rcu_read_lock_sched_held+0xd/0x70 [ 185.019073][T19084] ? mm_update_next_owner+0x7b0/0x7b0 [ 185.024451][T19084] do_group_exit+0xd0/0x2a0 [ 185.028958][T19084] get_signal+0x21a1/0x2430 [ 185.033470][T19084] ? exit_signals+0x8b0/0x8b0 [ 185.038157][T19084] arch_do_signal_or_restart+0x82/0x2300 [ 185.043791][T19084] ? __do_sys_perf_event_open+0xcf/0x32d0 [ 185.049527][T19084] ? get_sigframe_size+0x10/0x10 [ 185.054468][T19084] ? perf_event_set_output+0x5b0/0x5b0 [ 185.059944][T19084] ? lock_downgrade+0x6e0/0x6e0 [ 185.064805][T19084] exit_to_user_mode_prepare+0x15f/0x250 [ 185.070445][T19084] syscall_exit_to_user_mode+0x19/0x50 [ 185.075928][T19084] do_syscall_64+0x42/0xb0 [ 185.080379][T19084] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 185.086298][T19084] RIP: 0033:0x7f0b3b28b5a9 [ 185.090762][T19084] Code: Unable to access opcode bytes at 0x7f0b3b28b57f. [ 185.097765][T19084] RSP: 002b:00007f0b3bf57168 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 185.106677][T19084] RAX: 0000000000000003 RBX: 00007f0b3b3abf80 RCX: 00007f0b3b28b5a9 [ 185.114656][T19084] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000020000080 [ 185.122637][T19084] RBP: 00007f0b3b2e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 185.130610][T19084] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 185.138582][T19084] R13: 00007ffd90b1e98f R14: 00007f0b3bf57300 R15: 0000000000022000 [ 185.146562][T19084] [ 185.149721][T19084] Kernel Offset: disabled [ 185.154038][T19084] Rebooting in 86400 seconds..