) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xffffff7f]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:20 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x0, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000ea00", 0x1132}) 11:29:20 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x0, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:20 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8100000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:20 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x0, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:20 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x0, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:20 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x11, 0x2, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) r2 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) close(r2) 11:29:20 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xe000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:20 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x0, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00X\x00', 0x1132}) 11:29:20 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x0, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:20 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000008c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r0, &(0x7f0000000300)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000840)="2208ab70f844db002a54c847", &(0x7f0000000440)=""/208}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000340)='.*wlan1$\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000540)='procppp0lo\x00', 0xffffffffffffffff}, 0x30) socketpair(0x11, 0x5, 0x40, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x9, 0x1f, 0x1, 0x20, 0x0, 0x9, 0x20, 0x1, 0x1, 0x0, 0x9, 0x1, 0x4, 0x1, 0x5, 0x9, 0x101, 0xf3e, 0x5, 0x6, 0xfffffffffffffff8, 0x0, 0x1, 0xfffffffffffffff7, 0x1f, 0xfffffffffffffffa, 0x4, 0x3f, 0x2, 0x7f, 0x8001, 0x3ff, 0x9498, 0x5b, 0x4, 0x36, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000280), 0x8}, 0x400, 0x7fff, 0x800, 0x7, 0x8, 0xc24d, 0x1ff}, r1, 0x3, r3, 0xa) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1e, 0xd, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000003000000000000002800000085000000470000000000000000000000008409500001000000000000000000000018580400000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="0000007e17f2f1c3f86adbee7900000000000400000000000000000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x1, 0x47, &(0x7f0000000680)=""/71, 0x41100, 0x1, [], 0x0, 0xf}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r5, 0x50, &(0x7f0000000780)}, 0x10) r6 = gettid() r7 = perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x15, 0x7, 0xffffffffffff6adf, 0x2, 0x0, 0x1000, 0x400, 0x3, 0x401, 0x0, 0x7, 0x4, 0x800, 0x800, 0x7, 0x1, 0x1, 0x6345, 0x2, 0x0, 0x3, 0x3, 0x2, 0xfffffffffffffff9, 0xffffffffffff0000, 0x8, 0x0, 0x3ff, 0x3, 0x2, 0x5, 0x3, 0x100000000, 0x4, 0x6, 0x6, 0x0, 0xfff, 0x7, @perf_config_ext={0xff}, 0x8140, 0xceb, 0xd8c, 0x2, 0x7, 0x4, 0x7fff}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0xa) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x1, 0x6, 0xe8a3, 0x0, 0x1, 0x80, 0x8, 0xffff, 0x6, 0x1, 0x100000000, 0xffff, 0x1, 0x22a64869, 0x63719e22, 0x9, 0x1000, 0x77e, 0x0, 0x0, 0xfb94, 0xb0cb, 0x40, 0x5, 0x1ff, 0x6, 0x0, 0x4, 0x80000000, 0xe341, 0xc8, 0x7, 0x1, 0x400, 0x100000001, 0x0, 0x40, 0x1, @perf_config_ext={0xfff, 0x6}, 0x42, 0x80000000, 0xffffffffffffff0a, 0x7, 0x2, 0x7fff, 0x3}, r6, 0x10, r7, 0x3) 11:29:20 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x88640000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000620000000700000000009b009500000000000000"], &(0x7f00000001c0)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xf4, 0x28, &(0x7f0000000380)="90a0574984b93d0796a419461ee7014c321beba9787057c4f3be494ab2ca18a3a2efa0e32fdc55fb650ce3c67bc621411b127ec22c81af8d98d1d24b62c9c1d7deb165cac350a67bac7d2bab3a5acd1090cdc0e54bab71dcb18c5f9e1c51f4e344d7036f1be9824c5da66669d1b6080853a5935e54c8d1a7ac8dd7e5f84d599f1bf8f05d209e34d550a8dadd5c571dd6c856b839abe17f15b96c3be85e1760ec3fea46b721b97b28419d23acce53f822f675468f6cb8a65173005a7f6b29e179bf41ff065c59a463bc73b26daf024c7d1fe2ea8c13b4294f40c6ae1e32d6f736a2b9602ba06ad8aa3801875a89c9b0c0eba455c6", &(0x7f0000000000)=""/40, 0x3}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x1e, 0x18, &(0x7f0000000180)="0aac1a0494632d47af63882c88caf0e3e2b12f7d95a1006b79c3acf1b685", &(0x7f0000000340)=""/24, 0xf000}, 0x28) 11:29:20 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x81, 0x5, 0x8001, 0x8, 0x0, 0xfffffffeffffffff, 0x40, 0x8, 0x5, 0x1, 0xfa, 0xd59, 0x400, 0x1, 0xffffffff00000001, 0x8001, 0x77, 0x1, 0xfffffffffffffffd, 0x8000, 0x7ff, 0x1000, 0x7fff, 0x3, 0x6, 0x0, 0xfff, 0x7, 0xfffffffffffff801, 0x8, 0x1000000000000000, 0x9, 0x8, 0x3ff, 0x2, 0x5, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x1000, 0xffffffff00000000, 0x1, 0x0, 0x20, 0x8, 0x7fffffff}, r3, 0x3, r2, 0x3) recvmsg$kcm(r0, &(0x7f0000002040)={&(0x7f0000001dc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001e40)=""/10, 0xa}, {&(0x7f0000001e80)=""/28, 0x1c}, {&(0x7f0000001ec0)=""/142, 0x8e}, {&(0x7f0000001f80)=""/123, 0x7b}], 0x4, 0x0, 0x0, 0x5}, 0x1) sendmsg$kcm(r0, &(0x7f00000028c0)={&(0x7f0000002080)=@can={0x1d, r4}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002100)="d676de717dc88285bcb901cf4a30af96114e2678143359e033f3a1fb24ba93b002360f4ca570b048e7ba0eb23a73cf4bc771f3f2e1be23fd631bad29d5f395", 0x3f}, {&(0x7f0000002140)="fc40af8d592ab799a29390a8dda8eaadbf63cd", 0x13}, {&(0x7f0000002180)="6a9d69176d8137cfa05f667f0d2f98e751ad4109bb7d43eab18d64ff7b75ebd3", 0x20}, {&(0x7f00000021c0)="6d730d68d32b44acd352dc31716d3afce666f550689109f88181ea3f06a6fca70be7aa35620913e90e2130e928a26baa41b79431ef09a5cd196486c7168b10c29d3881882179e5e95d74a2018fd31e10adb53d4bfd8d8879f5b6c38e9344b548a798ece430b9f98de5126d3ec05f1b771540d4b87560e4f251d2cb6ce80385dff2210f7808bfd93cfb923c70b9678463b264e576c760d7c9db9b0ec05d7ef068c0d4cda319", 0xa5}, {&(0x7f0000002280)="aa3d038e0b02fed40fc372102fcd51f0ad3a8fc3c91256a295e89bc0e8e1321818865102e710f158fe7cbec1e55e3d2da55d89fb27b7b52ebd1c2dd386da1b9d64a0b5e679523694044ef722e141ac5d1b2c65ce17ebbb0a30498d6e4ccf9b23a401f7ae3089e02eb91476dbadc38fca2e6c8909fa07f64c1781667b9e2f7195455ff255c99382b667399bf12515e592b59eb0439b99170d39b52ae5395718161e54c7404660659074d71e395c3e5b801711a8f40defd2ee0995b3", 0xbb}, {&(0x7f0000002340)="548fc9aa6d32c9784f824e10658d8d8aea6292c3b32f728d8b1127ba78e7f17fba25d0ed14d762309bd538554d3a8fa5f278c8150fe5bff58a82cdf36ac7299629fc705d2a0954a32c74e313ba45bca9ceab8f4392b99d94055da7da4b24b2083bcb", 0x62}, {&(0x7f00000023c0)="2cce06ca72a9907682f2640b5018bab497866090b8bf522dfe985b3cafab6ee00fb7e0b88479edcbc3e4d50193b298fa96196df331b8bee2a8241851f8028cdcaeb5d2f96d45a419d936bec38e056225f4114b370a03ada914aec0c0d079bbc6b3c194aa89dcbf5e0e654ceed5634a3212c066fd9923e8716a91847b65a0e437989548db21c9b7f81496c7bb1891933f9a16a106d304813ff164a1ea2ed2f4431a6248ecb954ffe51cff3b5bd510b3e974d9c51f5a69f845c796a173f884", 0xbe}], 0x7, &(0x7f0000002500)=[{0x60, 0x117, 0x6, "d38956b52a6372f2390dbade6eb4758e50ec6a179fb8de0538370b3e6755b1101fb233ebbe4e09ecd40dcff8eaffb637b4befc825318b90b1a9d7b92c18596fa8c9ee4f1a73053e5bd94b809"}, {0x20, 0x1, 0x1ff, "c3431da4c9f55e7025184a"}, {0xa8, 0x10e, 0xffffffffffffffff, "e51fc491abd1b6260598174203f42bce12757608ff329250a6c00b758e55e06402ba68d7db1557650d0503a33686c16f8f73ecee662e02b7ee6b76c368a60a93e5e981e953751830ac64f7fb01e81b0b53ac3ee1979105b34e8350530c6a562545e332eb5f1a89416f24f6cfc0e77a5dedb4f46b199b5bfd3d215994033aba7a844b71d1a1340309b3075b7b879304e96a"}, {0x100, 0x115, 0x5, "7182f2a125be0aad6b275197fc8bc80366102cf33aad10f5a662955f248f8bcc0fcdea7971caa940d9ca2066b5369d8c3ae4725c8675e918c977722bf4e1a4ca33d4166384413fbcca7ab2bc53d7cb291e13e1f398233545681bf23aea63898d9137876cf28b886c957575c484e0ba1d2c8d138c4e8fee7020ee646fc49a9e75e9de4050801ab1412184f1bf1eac8a7e1f1fcb635666c5b8ef95caeeec6d96bc6388b4bf07ebb09b99d50e116ece24fa3c5571ce77baeb159cec6fae4a195828b4c0cbc32f6bfe37e4236db368217cbd98b084305b04a6c1f1c23f7d53bb5c01d26e908f0cae74c5e4d5620f"}, {0xe0, 0xff, 0xfffffffffffffffd, "394734eb6715ca1905f59f70056f7bef58e1d30dcdcd9b8f500ab5287b0637ed7a223ffe67ecad9d919b07e8501d58db973ec89aa5b0c16d7b45200eb20679ac257e518db4943f7a56f7f5322a39f327e8e19c8c234efcd3187293eec07d541b8e12452030dd1fc6c90537d8f150a70eb28532d33292f3c969c1c59c76efc1a39ca81fc86133128ecc8e2afc85fe8b04c6a22e1c71b7887da6b812657102d517153de0057698ef72914712d72849a52307cc9b44c038edf731d9d90851aa1e7710c8e654044b9f16189e5384e757ee3c"}, {0xa0, 0x105, 0x100000001, "de38a574fd697773137474960b12791486eac4db82d648274c82565e928794dd2003f89cdbf3e68c507a359534887c567fb361ba8dbd4d1b137ac11507deba7b581bb9d1f073d9c01c50ebe25c750c4ec0ea6ad8d93cc840d710a46c528382463ed24d46b1da2497e3d21a027f80db893652eb7ec6b25597679c9bf6dd8bf91c94166f5a1178d1926ac3e6bf8af4"}], 0x3a8, 0x4000}, 0x11) r5 = socket$kcm(0x2c, 0x3, 0x0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r5, 0x11b, 0x2, &(0x7f0000000040)=r6, 0x1af) 11:29:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000a500", 0x1132}) 11:29:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="850000000000000057000000000000000000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x80000000, 0x99, &(0x7f0000000180)=""/153}, 0x48) 11:29:21 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x0, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:21 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:21 executing program 0: r0 = socket$kcm(0x11, 0x40000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x7, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x2, 0x7, 0x20, 0x1, 0x0, 0x8, 0x48000, 0x8, 0x8, 0x7fffffff, 0x5, 0x10001, 0x7cf10eb8, 0x6, 0x100000000, 0x7, 0x10000, 0x4, 0x6, 0xff, 0x9, 0xa2d, 0x401, 0x7f, 0x9, 0x2, 0x7ff, 0x4, 0x8, 0x8001, 0x800, 0x5, 0x0, 0x7ff, 0x6, 0x100000001, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000080), 0x6}, 0x2018, 0x4, 0xffff, 0x7, 0x0, 0x5, 0x80000000}, 0xffffffffffffff9c, 0x9, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x34, &(0x7f0000001280)=r1, 0x4) 11:29:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xeacc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000000)=0x83) 11:29:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00/\x00', 0x1132}) 11:29:21 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x0, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:21 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000140)}, 0x20000004) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socket$kcm(0x29, 0x2, 0x0) close(r0) 11:29:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001b00)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000001b80)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xf0}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000040)=[{&(0x7f00000014c0)=""/153, 0x99}], 0x1, &(0x7f0000001580)=""/131, 0x83, 0x4}, 0x40) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0xee6e0000, 0x2a0]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001a80)) sendmsg$kcm(r1, &(0x7f0000001a40)={&(0x7f0000001640)=@pppoe={0x18, 0x0, {0x3, @broadcast, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000016c0)="9e5780b30930ae1e6a00b5b56803ead116c797a9a4a941bc5cffe3ae3e4a2dec14a7ea6e900b6c57d7a43e45e197935a47f8cb9cc1cc5b33fc20067a3a355d7c9bc8fa1372f33e5b3675fc24b22e92a41e9a1fa97ae97202c6b649c752977631d0f20d12eae53cacb998e506dcdac65b0d82bc10d6afe1e2c9934df43fed71dd0e038dfe0eee45db1d76ebee12ab092d63df300393786bf35855fb469ee2b4a97a72b1cc6969665fe8407c69", 0xac}, {&(0x7f0000001780)="d639b7b7e00091411a372e9af51f43f6b01f19520b09ce2a06ddf5f8517ecd00e601a31f67129f1e9759b5ab931fd1eaf2719f6436ccf12fb57a697d6b76eae2899fe8f7efe82ccbb1732b5fe82384328d625b1d41c51fdb7155dd546ce9d3d20450b89e9f9a0a7ce03a56aa2e26bfc7dd8f60124974bc4ce4abfce2128b934693f9f76e6634b14c876a55676ac791242c2c1a442e6682a43ae462ebc9cae1b00afac673346e4004ce28f75b47cf240b44317d393bfa6eccb7d9c92665b1d4e4d3d7375bdfc8f2ed90514df73acfad8273e8e568b45d304ffddabaf16e9273", 0xdf}], 0x2, &(0x7f0000001880)=[{0xe8, 0x0, 0x9, "af97d092c0c3999ec78e1bf365abde9e0d1dff1a0bf6469e1f8020618c5dd52ed0e822338952d794372209e10a005c3735f74fc4a6b224d287010e554c49e9c8820b06a81c41acafc1523d0ad5c050bae04bfef87b23f4f8f9edff7db21a59d02fd1b59e1c58f165a9971ad55019a18705d1e27b5382827791f4b8735c77277be20e093ae1ae3e390f1844a4aa74b9d036ab0cbf2fa2548b750159bb4db7c5ec7ae67ac40df3ebef34ae735c72635269b3b92bfb14adc6e6ac061547382a45cd928194388d4f627a797d651c5e6ecfdeadc34bb9f521"}, {0xc0, 0x117, 0x7fff, "dec1f87bc2a5ebea354ac4348f92d9d26208c96cb4822a81b9634b1ee0342ca3f0ef5e8a80fd53dc9486fb832efa62c56236de5eb84742778ef52b6127655fb4764bdbe854b00a655c0d46f6bb35acc2e88e97d593a40dd2ebc3d494aa2b74e4c1a1b5b6b1d095ef54316ac0d5b695b70fd58020dcb355cba9fd2d164c007f2eb2a1f695a6c5625766dc9a5bd63abb0994755610a845a9285bef87473c7d2414d82c739cd5839ac3e27a3a6c20cc61"}], 0x1a8, 0x80}, 0x800) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001b40)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000400)={r1}) 11:29:21 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4888]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 241.721856] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:29:22 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x0, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8947, &(0x7f0000000000)={'bridge0\x00', @random="01003a1e2410"}) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) 11:29:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000b800", 0x1132}) 11:29:22 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x0, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000001b00)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000001b80)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xf0}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000040)=[{&(0x7f00000014c0)=""/153, 0x99}], 0x1, &(0x7f0000001580)=""/131, 0x83, 0x4}, 0x40) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0xee6e0000, 0x2a0]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000001a80)) sendmsg$kcm(r1, &(0x7f0000001a40)={&(0x7f0000001640)=@pppoe={0x18, 0x0, {0x3, @broadcast, 'veth0_to_bridge\x00'}}, 0x80, &(0x7f0000000440)=[{&(0x7f00000016c0)="9e5780b30930ae1e6a00b5b56803ead116c797a9a4a941bc5cffe3ae3e4a2dec14a7ea6e900b6c57d7a43e45e197935a47f8cb9cc1cc5b33fc20067a3a355d7c9bc8fa1372f33e5b3675fc24b22e92a41e9a1fa97ae97202c6b649c752977631d0f20d12eae53cacb998e506dcdac65b0d82bc10d6afe1e2c9934df43fed71dd0e038dfe0eee45db1d76ebee12ab092d63df300393786bf35855fb469ee2b4a97a72b1cc6969665fe8407c69", 0xac}, {&(0x7f0000001780)="d639b7b7e00091411a372e9af51f43f6b01f19520b09ce2a06ddf5f8517ecd00e601a31f67129f1e9759b5ab931fd1eaf2719f6436ccf12fb57a697d6b76eae2899fe8f7efe82ccbb1732b5fe82384328d625b1d41c51fdb7155dd546ce9d3d20450b89e9f9a0a7ce03a56aa2e26bfc7dd8f60124974bc4ce4abfce2128b934693f9f76e6634b14c876a55676ac791242c2c1a442e6682a43ae462ebc9cae1b00afac673346e4004ce28f75b47cf240b44317d393bfa6eccb7d9c92665b1d4e4d3d7375bdfc8f2ed90514df73acfad8273e8e568b45d304ffddabaf16e9273", 0xdf}], 0x2, &(0x7f0000001880)=[{0xe8, 0x0, 0x9, "af97d092c0c3999ec78e1bf365abde9e0d1dff1a0bf6469e1f8020618c5dd52ed0e822338952d794372209e10a005c3735f74fc4a6b224d287010e554c49e9c8820b06a81c41acafc1523d0ad5c050bae04bfef87b23f4f8f9edff7db21a59d02fd1b59e1c58f165a9971ad55019a18705d1e27b5382827791f4b8735c77277be20e093ae1ae3e390f1844a4aa74b9d036ab0cbf2fa2548b750159bb4db7c5ec7ae67ac40df3ebef34ae735c72635269b3b92bfb14adc6e6ac061547382a45cd928194388d4f627a797d651c5e6ecfdeadc34bb9f521"}, {0xc0, 0x117, 0x7fff, "dec1f87bc2a5ebea354ac4348f92d9d26208c96cb4822a81b9634b1ee0342ca3f0ef5e8a80fd53dc9486fb832efa62c56236de5eb84742778ef52b6127655fb4764bdbe854b00a655c0d46f6bb35acc2e88e97d593a40dd2ebc3d494aa2b74e4c1a1b5b6b1d095ef54316ac0d5b695b70fd58020dcb355cba9fd2d164c007f2eb2a1f695a6c5625766dc9a5bd63abb0994755610a845a9285bef87473c7d2414d82c739cd5839ac3e27a3a6c20cc61"}], 0x1a8, 0x80}, 0x800) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001b40)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000400)={r1}) 11:29:22 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:22 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000200)=@nfc_llcp, 0x80, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/57, 0x39}], 0x1, &(0x7f00000002c0)=""/51, 0x33}, 0x40010040) 11:29:22 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x0, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:22 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x20000000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xcc) close(r1) 11:29:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00J\x00', 0x1132}) 11:29:22 executing program 0: socketpair$unix(0x1, 0x402000000000002, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2b, 'pids'}]}, 0x6) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r1, r3, 0xb, 0x1}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2d, 'memory'}, {0x2d, 'pids'}]}, 0xe) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x1ff) 11:29:22 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xac05000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20000) recvmsg$kcm(r1, &(0x7f0000005380)={&(0x7f0000005000)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005080)=""/146, 0x92}, {&(0x7f0000005140)=""/200, 0xc8}], 0x2, &(0x7f0000005280)=""/210, 0xd2}, 0x40000000) sendmsg(r1, &(0x7f0000005780)={&(0x7f00000053c0)=@hci={0x1f, r4}, 0x80, &(0x7f0000005440), 0x0, &(0x7f0000005480)=[{0xc0, 0x10f, 0x5, "acb8b768c7897914c6df8d8fc8fe6992a9881e0746951858c2511a6255057b047a6ee270d5e97c86509bdf5c455a498755a21ee48b3f72ced27472592b9fc11ebf3ffbe4e71409c5a186c6e4b59d38fb9b97a776967d4c9fdfe41b951d5e87f004e0b8fb00dc48ab4f79fc1abc8b8cdf9ad26d71bc912bf8f68e453fae9cc526e4dc1fa4b80b6eb6acf7410bbad2c56e7a19f7803982edf1356651b42abdb5fe7cc8281322537de0e109eece1ff290f6"}, {0x90, 0x1, 0x7f, "158f258ee5768417cf58b54b902abaa17da5379c0b801f418e89acdaafaf9c0e8d45a2c4a7dca405ae0677a7e16481f7b82f04f51cf20af302f798d682faa51464362c85cd1161a78771349c58d62c14392531114c0d483054f8f39cedb56bf9877da858c5550d69bd0ae68f706d58ad11c6baad0b89ef097220d936ba"}, {0xa8, 0x199, 0x1, "6361f32ad9760b8b2a4be5482e8171689ab3507ae32b2227fdb24f539b14509737019a171d2b4dbc07014901d0c889c3b6ae1a46702e8f43dbd98f9396ed4720298e19116660c985875741b9c15940942c0428243d2c589684172d785a771bd6b9d9b7e1aa9d2b6fae2956f8cdcb87c9d7882f6ee19172a47349ecffb4d86d0f82395a568890fd5129dae7dc84e18594b2ed45"}, {0xf8, 0x11f, 0x4, "5efb78b1c8ceb8360d720aa5f8c6ba7952d987b45e5de45a18589bd9d08429e9a8c2fd9f8886fd8e9e6781159ada581c29c9aa2c6b3ec6637b4a80097d62a49648cd4f6e567f68e33a9c6c702303aaa90b2f95d3ce3c520e69a36d3a750d8169db4d2e65d12ecf5b1f634e5c98b91b406d06200d7cdc58f222bfc695f5e639da2f232c6540c2b8b1effc1be1fd243357ddcd19f2da6e45b0110d7c4e7b3eaaf9989f2aa0960b0eec89352316e8380b2bab6900e7e4dbd322b026195f780054257c410deec5c3f23d4c214f2813f21f926c372656c18eb8c18d0db047fdae8482cab3d0dbbe5b8d"}], 0x2f0, 0x8000}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f00000000c0)='selinux\x00'}, 0x30) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/24, 0x18}], 0x2, &(0x7f0000000380)=""/237, 0xed, 0x8000}, 0x0) 11:29:22 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x3, 0x11) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/217, 0xd9}, {&(0x7f00000003c0)=""/242, 0xf2}, {&(0x7f0000000540)=""/91, 0x5b}], 0x3, &(0x7f00000029c0)=""/4096, 0x1000, 0x39}, 0x40000000) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000100)=@ax25, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000009c0)=""/4096, 0x1000}, 0x20) socket$kcm(0x29, 0x0, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1302}}, 0x80, &(0x7f00000000c0), 0x2fe, &(0x7f0000000440)}, 0x0) 11:29:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x006\x00', 0x1132}) 11:29:22 executing program 0: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0xa0, 0x20, 0x101, 0x1, 0xffffffffffffffff, 0x383f}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000480)) r2 = getpid() perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xfffffffffffffffc, 0x9, 0x2, 0x3, 0x0, 0x1bea, 0x2000, 0x8, 0x6, 0xffffffffffffffff, 0x1000, 0x2, 0x16, 0x144, 0x200, 0x9, 0x1f, 0x6, 0x1, 0x9, 0x8, 0x0, 0x200000000, 0x9b, 0x2, 0x1, 0x8, 0x0, 0x19c, 0x4, 0xfffffffffffffffd, 0xb00b, 0x3, 0x7, 0x40, 0x30d, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000100), 0x9}, 0x30020, 0x1, 0x4, 0x0, 0x8, 0x9}, r2, 0xd, r0, 0x9) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a3, 0x0, 0x0, 0x80, 0xfffffffffffffffe}, 0x0, 0x0, r0, 0x0) 11:29:22 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x0, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:22 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4305000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 242.884858] audit: type=1804 audit(1540034962.584:61): pid=17458 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir450592132/syzkaller.gLMIgO/359/memory.events" dev="sda1" ino=16521 res=1 11:29:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x7f, 0x0, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000540)='0', &(0x7f0000000500)}, 0x20) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f00000000c0)='cpuset\\self$\'\x00'}, 0x30) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x3, 0x0, 0xc9, 0x6, 0x0, 0x81, 0x142, 0x8, 0x6, 0x8001, 0xc000000, 0xfffffffffffffff9, 0xf2f, 0x401, 0x0, 0x6, 0x8, 0xffffffff, 0x1c0, 0x7, 0x1, 0x17, 0x8001, 0x8, 0x6, 0x8000, 0xffffffff, 0x2, 0x5, 0x4, 0x1000, 0x2, 0x37b00, 0x1, 0x81, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x80, 0x9, 0x1, 0x7, 0x81, 0x6, 0xb9f9}, r0, 0xa, r1, 0x9) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x6, 0x400, &(0x7f00000009c0)={0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000100)='./file0\x00'}, 0x10) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() close(r5) r6 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000600)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r3, 0x0, 0xd6, &(0x7f0000000800)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e", 0xffffffffffffffff}, 0x30) getpid() ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x811}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x6e) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) recvmsg$kcm(r6, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/57, 0x39}], 0x1, &(0x7f0000001a40)=""/4096, 0x1000, 0x8}, 0x0) write$cgroup_type(r7, &(0x7f0000001900)="746888646164656400", 0xfdef) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000440)={r4, &(0x7f0000000340)="3a874689c7f3d13dffbed445c78daac5f5b5f0ad238e61c627ab75f569ba1bcd37433bdbf445ca0f12acb57974aed82545e1901702af97b26c3fc89ba1fd00b5e77a14efd468ec5f78e2135fb84c7e048c902b15b74a632ae77268b91f015559a47e8c74d5af840a8127773c9a5f9b758b1267a7d7273b3fb2c14c93fb2bb3fb88bb6d6496de57a9de53b1e099758b749070aca21a89f01196bdd9d65ffa317519be4f3e7de0a49dd14b1ed1fbc4f4c9427efb03304b7425d0510c9d181f55a57153c4b024c470002ff217320714b8", &(0x7f0000000a00)=""/234}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) 11:29:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x40086602, &(0x7f0000000080)={0x3f00, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x100000000, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x8, 0x0, 0x4}) 11:29:22 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000e200", 0x1132}) [ 242.987578] audit: type=1804 audit(1540034962.684:62): pid=17468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir450592132/syzkaller.gLMIgO/359/memory.events" dev="sda1" ino=16521 res=1 11:29:22 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x0, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20000) recvmsg$kcm(r1, &(0x7f0000005380)={&(0x7f0000005000)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005080)=""/146, 0x92}, {&(0x7f0000005140)=""/200, 0xc8}], 0x2, &(0x7f0000005280)=""/210, 0xd2}, 0x40000000) sendmsg(r1, &(0x7f0000005780)={&(0x7f00000053c0)=@hci={0x1f, r4}, 0x80, &(0x7f0000005440), 0x0, &(0x7f0000005480)=[{0xc0, 0x10f, 0x5, "acb8b768c7897914c6df8d8fc8fe6992a9881e0746951858c2511a6255057b047a6ee270d5e97c86509bdf5c455a498755a21ee48b3f72ced27472592b9fc11ebf3ffbe4e71409c5a186c6e4b59d38fb9b97a776967d4c9fdfe41b951d5e87f004e0b8fb00dc48ab4f79fc1abc8b8cdf9ad26d71bc912bf8f68e453fae9cc526e4dc1fa4b80b6eb6acf7410bbad2c56e7a19f7803982edf1356651b42abdb5fe7cc8281322537de0e109eece1ff290f6"}, {0x90, 0x1, 0x7f, "158f258ee5768417cf58b54b902abaa17da5379c0b801f418e89acdaafaf9c0e8d45a2c4a7dca405ae0677a7e16481f7b82f04f51cf20af302f798d682faa51464362c85cd1161a78771349c58d62c14392531114c0d483054f8f39cedb56bf9877da858c5550d69bd0ae68f706d58ad11c6baad0b89ef097220d936ba"}, {0xa8, 0x199, 0x1, "6361f32ad9760b8b2a4be5482e8171689ab3507ae32b2227fdb24f539b14509737019a171d2b4dbc07014901d0c889c3b6ae1a46702e8f43dbd98f9396ed4720298e19116660c985875741b9c15940942c0428243d2c589684172d785a771bd6b9d9b7e1aa9d2b6fae2956f8cdcb87c9d7882f6ee19172a47349ecffb4d86d0f82395a568890fd5129dae7dc84e18594b2ed45"}, {0xf8, 0x11f, 0x4, "5efb78b1c8ceb8360d720aa5f8c6ba7952d987b45e5de45a18589bd9d08429e9a8c2fd9f8886fd8e9e6781159ada581c29c9aa2c6b3ec6637b4a80097d62a49648cd4f6e567f68e33a9c6c702303aaa90b2f95d3ce3c520e69a36d3a750d8169db4d2e65d12ecf5b1f634e5c98b91b406d06200d7cdc58f222bfc695f5e639da2f232c6540c2b8b1effc1be1fd243357ddcd19f2da6e45b0110d7c4e7b3eaaf9989f2aa0960b0eec89352316e8380b2bab6900e7e4dbd322b026195f780054257c410deec5c3f23d4c214f2813f21f926c372656c18eb8c18d0db047fdae8482cab3d0dbbe5b8d"}], 0x2f0, 0x8000}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f00000000c0)='selinux\x00'}, 0x30) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/24, 0x18}], 0x2, &(0x7f0000000380)=""/237, 0xed, 0x8000}, 0x0) 11:29:22 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x0, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 243.097413] audit: type=1800 audit(1540034962.754:63): pid=17482 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor3" name="memory.events" dev="sda1" ino=16521 res=0 11:29:22 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa0008000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:23 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x0, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00[\x00', 0x1132}) [ 243.331310] audit: type=1804 audit(1540034963.034:64): pid=17506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir450592132/syzkaller.gLMIgO/360/memory.events" dev="sda1" ino=17177 res=1 11:29:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 11:29:23 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x11000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:23 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0x0, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 243.849105] device nr0 entered promiscuous mode 11:29:23 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0x0, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 11:29:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20000) recvmsg$kcm(r1, &(0x7f0000005380)={&(0x7f0000005000)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005080)=""/146, 0x92}, {&(0x7f0000005140)=""/200, 0xc8}], 0x2, &(0x7f0000005280)=""/210, 0xd2}, 0x40000000) sendmsg(r1, &(0x7f0000005780)={&(0x7f00000053c0)=@hci={0x1f, r4}, 0x80, &(0x7f0000005440), 0x0, &(0x7f0000005480)=[{0xc0, 0x10f, 0x5, "acb8b768c7897914c6df8d8fc8fe6992a9881e0746951858c2511a6255057b047a6ee270d5e97c86509bdf5c455a498755a21ee48b3f72ced27472592b9fc11ebf3ffbe4e71409c5a186c6e4b59d38fb9b97a776967d4c9fdfe41b951d5e87f004e0b8fb00dc48ab4f79fc1abc8b8cdf9ad26d71bc912bf8f68e453fae9cc526e4dc1fa4b80b6eb6acf7410bbad2c56e7a19f7803982edf1356651b42abdb5fe7cc8281322537de0e109eece1ff290f6"}, {0x90, 0x1, 0x7f, "158f258ee5768417cf58b54b902abaa17da5379c0b801f418e89acdaafaf9c0e8d45a2c4a7dca405ae0677a7e16481f7b82f04f51cf20af302f798d682faa51464362c85cd1161a78771349c58d62c14392531114c0d483054f8f39cedb56bf9877da858c5550d69bd0ae68f706d58ad11c6baad0b89ef097220d936ba"}, {0xa8, 0x199, 0x1, "6361f32ad9760b8b2a4be5482e8171689ab3507ae32b2227fdb24f539b14509737019a171d2b4dbc07014901d0c889c3b6ae1a46702e8f43dbd98f9396ed4720298e19116660c985875741b9c15940942c0428243d2c589684172d785a771bd6b9d9b7e1aa9d2b6fae2956f8cdcb87c9d7882f6ee19172a47349ecffb4d86d0f82395a568890fd5129dae7dc84e18594b2ed45"}, {0xf8, 0x11f, 0x4, "5efb78b1c8ceb8360d720aa5f8c6ba7952d987b45e5de45a18589bd9d08429e9a8c2fd9f8886fd8e9e6781159ada581c29c9aa2c6b3ec6637b4a80097d62a49648cd4f6e567f68e33a9c6c702303aaa90b2f95d3ce3c520e69a36d3a750d8169db4d2e65d12ecf5b1f634e5c98b91b406d06200d7cdc58f222bfc695f5e639da2f232c6540c2b8b1effc1be1fd243357ddcd19f2da6e45b0110d7c4e7b3eaaf9989f2aa0960b0eec89352316e8380b2bab6900e7e4dbd322b026195f780054257c410deec5c3f23d4c214f2813f21f926c372656c18eb8c18d0db047fdae8482cab3d0dbbe5b8d"}], 0x2f0, 0x8000}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f00000000c0)='selinux\x00'}, 0x30) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/24, 0x18}], 0x2, &(0x7f0000000380)=""/237, 0xed, 0x8000}, 0x0) 11:29:23 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x0, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:23 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f300", 0x1132}) 11:29:23 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x34000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 244.156023] protocol 0800 is buggy, dev ip6_vti0 [ 244.196934] protocol 0800 is buggy, dev ip6_vti0 [ 244.216800] protocol 0800 is buggy, dev ip6_vti0 [ 244.223693] protocol 0800 is buggy, dev ip6_vti0 [ 244.229201] protocol 0800 is buggy, dev ip6_vti0 [ 244.234491] protocol 0800 is buggy, dev ip6_vti0 11:29:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\t\x00', 0x1132}) [ 244.246318] protocol 0800 is buggy, dev ip6_vti0 11:29:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20000) recvmsg$kcm(r1, &(0x7f0000005380)={&(0x7f0000005000)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005080)=""/146, 0x92}, {&(0x7f0000005140)=""/200, 0xc8}], 0x2, &(0x7f0000005280)=""/210, 0xd2}, 0x40000000) sendmsg(r1, &(0x7f0000005780)={&(0x7f00000053c0)=@hci={0x1f, r4}, 0x80, &(0x7f0000005440), 0x0, &(0x7f0000005480)=[{0xc0, 0x10f, 0x5, "acb8b768c7897914c6df8d8fc8fe6992a9881e0746951858c2511a6255057b047a6ee270d5e97c86509bdf5c455a498755a21ee48b3f72ced27472592b9fc11ebf3ffbe4e71409c5a186c6e4b59d38fb9b97a776967d4c9fdfe41b951d5e87f004e0b8fb00dc48ab4f79fc1abc8b8cdf9ad26d71bc912bf8f68e453fae9cc526e4dc1fa4b80b6eb6acf7410bbad2c56e7a19f7803982edf1356651b42abdb5fe7cc8281322537de0e109eece1ff290f6"}, {0x90, 0x1, 0x7f, "158f258ee5768417cf58b54b902abaa17da5379c0b801f418e89acdaafaf9c0e8d45a2c4a7dca405ae0677a7e16481f7b82f04f51cf20af302f798d682faa51464362c85cd1161a78771349c58d62c14392531114c0d483054f8f39cedb56bf9877da858c5550d69bd0ae68f706d58ad11c6baad0b89ef097220d936ba"}, {0xa8, 0x199, 0x1, "6361f32ad9760b8b2a4be5482e8171689ab3507ae32b2227fdb24f539b14509737019a171d2b4dbc07014901d0c889c3b6ae1a46702e8f43dbd98f9396ed4720298e19116660c985875741b9c15940942c0428243d2c589684172d785a771bd6b9d9b7e1aa9d2b6fae2956f8cdcb87c9d7882f6ee19172a47349ecffb4d86d0f82395a568890fd5129dae7dc84e18594b2ed45"}, {0xf8, 0x11f, 0x4, "5efb78b1c8ceb8360d720aa5f8c6ba7952d987b45e5de45a18589bd9d08429e9a8c2fd9f8886fd8e9e6781159ada581c29c9aa2c6b3ec6637b4a80097d62a49648cd4f6e567f68e33a9c6c702303aaa90b2f95d3ce3c520e69a36d3a750d8169db4d2e65d12ecf5b1f634e5c98b91b406d06200d7cdc58f222bfc695f5e639da2f232c6540c2b8b1effc1be1fd243357ddcd19f2da6e45b0110d7c4e7b3eaaf9989f2aa0960b0eec89352316e8380b2bab6900e7e4dbd322b026195f780054257c410deec5c3f23d4c214f2813f21f926c372656c18eb8c18d0db047fdae8482cab3d0dbbe5b8d"}], 0x2f0, 0x8000}, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f00000000c0)='selinux\x00'}, 0x30) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/41, 0x29}, {&(0x7f00000002c0)=""/24, 0x18}], 0x2, &(0x7f0000000380)=""/237, 0xed, 0x8000}, 0x0) 11:29:24 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0x0, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:24 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x0, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:24 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) [ 244.424150] audit: type=1804 audit(1540034964.124:65): pid=17576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir450592132/syzkaller.gLMIgO/362/memory.events" dev="sda1" ino=17189 res=1 11:29:24 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0x0, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 244.520287] protocol 0800 is buggy, dev ip6_vti0 [ 244.527806] protocol 0800 is buggy, dev ip6_vti0 [ 244.533503] protocol 0800 is buggy, dev ip6_vti0 11:29:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001800", 0x1132}) 11:29:24 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x0, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) 11:29:24 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4788]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:24 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x0, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:24 executing program 3: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80800, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'veth1_to_bond\x00', @local}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffe) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r2, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/241, 0xf1, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r3, 0x4) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000340)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r4, 0x10, &(0x7f00000003c0)={&(0x7f0000000380)=""/55, 0x37, r3}}, 0x10) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000480)={0x5, &(0x7f0000000440)=[{0x2400000, 0x8, 0x7f0, 0x1}, {0xaf0, 0x4, 0x2, 0x8000}, {0x7, 0x2, 0x81, 0x5f}, {0xff, 0x6e2, 0xffffffff, 0x81}, {0x3, 0x9, 0x7, 0x400}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000004c0)={0x5, 0x70, 0x8001, 0x3, 0x1, 0x400, 0x0, 0x3, 0x40000, 0x4, 0x2f9f, 0x1, 0x9, 0x2, 0x401, 0x80, 0x2, 0x2, 0x1, 0x1, 0x1, 0x7f, 0x1, 0x3, 0x8, 0xf26, 0x7, 0x8, 0x1ff, 0x800, 0x100000001, 0x8eb5, 0x8d9, 0x1, 0x5, 0xa10, 0x5, 0x32, 0x0, 0x12, 0x1, @perf_config_ext={0x6, 0x55}, 0x8000, 0x55a32b08, 0x200, 0x5, 0x2, 0x3df1e774, 0x1}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r4, 0x10, &(0x7f0000000600)={&(0x7f0000000540)=""/158, 0x9e, r3}}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f00000006c0)='./file0\x00'}, 0x10) gettid() bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={0x0, r2, 0xa, 0x3}, 0x14) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000780)) recvmsg$kcm(r2, &(0x7f0000000b80)={&(0x7f00000007c0)=@hci, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000840)=""/243, 0xf3}, {&(0x7f0000000940)=""/96, 0x60}, {&(0x7f00000009c0)=""/59, 0x3b}, {&(0x7f0000000a00)=""/112, 0x70}, {&(0x7f0000000a80)}], 0x5, &(0x7f0000000b40)=""/16, 0x10, 0x1}, 0x2000) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000bc0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000c40)) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000c80)) getpid() ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000cc0)={'yam0\x00', @remote}) 11:29:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00+\x00', 0x1132}) 11:29:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7030000000000006a2100fe000000008500000020000000b7000000000000ed9400400000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x28, &(0x7f0000000000)="8d50d24bb223fc924989c551ae99", &(0x7f0000000040)=""/40}, 0x28) 11:29:24 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x6558000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) 11:29:24 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x0, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:24 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x0, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00.\x00', 0x1132}) 11:29:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x400, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x200}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000100)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x6c00}]}, &(0x7f0000f6bffb)='GPL\x00', 0x7, 0xfb, &(0x7f00000001c0)=""/251}, 0x48) 11:29:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:24 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x43050000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:24 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x0, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:25 executing program 3: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000402080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r0, r0}) 11:29:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001300", 0x1132}) 11:29:25 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000040)="754ad904148cc66a4e0b94e35381088711e1076b3b71eae22c1afee3cc5090bfd4e979f238fac4f6767a6facab925cfa623e31aa98593b3a7ef276157f1709d742ca55cd595b899f11cc7d061ddd09d8", &(0x7f0000000140)="a7e2d6f469141e04ce2c8e1583f04de835e0", 0x2}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000000580), 0xe8030000, &(0x7f00000000c0)=ANY=[]}, 0x20000005) close(r1) 11:29:25 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xe00000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:25 executing program 3: r0 = socket$kcm(0xa, 0x20122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000040), 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x40000000, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc85a2b1496c0c48000402080a2f858ad2c4aa412d", 0x48}], 0x1}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r0, r0}) 11:29:25 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x0, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000040)="754ad904148cc66a4e0b94e35381088711e1076b3b71eae22c1afee3cc5090bfd4e979f238fac4f6767a6facab925cfa623e31aa98593b3a7ef276157f1709d742ca55cd595b899f11cc7d061ddd09d8", &(0x7f0000000140)="a7e2d6f469141e04ce2c8e1583f04de835e0", 0x2}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000000580), 0xe8030000, &(0x7f00000000c0)=ANY=[]}, 0x20000005) close(r1) 11:29:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x008\x00', 0x1132}) 11:29:25 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x0, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:25 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x86ddffff00000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:25 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x400, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000600)={"00ac730000000000ec973f820f7c4000", 0xc202}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) close(r0) 11:29:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x002\x00', 0x1132}) 11:29:25 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x0, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x100000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f900", 0x1132}) 11:29:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) 11:29:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000400)="bb3bc99b857f627d48c38a7abaae14269eac9c57cdb2df29737a6420e30553a0194e221ae422d39f91961034e41eba9a9d4f5770241bf2e34973c1fd02deebd5d15c4c74e28d109298efd77542e01867074a383ecc0d1084d3995dd62c10b1296b52ee32480d0617e0e253a8b3b4532928c1406daf7ae5cf4ad618c5f1c03d3e8522215e1551a4883dd2e5faca863e2a2d772b750256fe89fa27a530a6a434ff3bb1dba48d97f33e44e5e2fdb9b203f0b954149e64d6d77f54f9a1fa7988442fc63673"}, 0x10) socketpair(0x1a, 0x7ffff, 0x1000, &(0x7f0000000500)={0xffffffffffffffff}) socketpair(0x4, 0x5, 0x7, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x2509, &(0x7f0000000100)=@raw=[@exit, @generic={0x8, 0x20, 0xe3e, 0x7fff}, @map={0x18, 0x0, 0x1, 0x0, r1}, @jmp={0x5, 0x5, 0xf, 0x6, 0x4, 0xfffffffffffffff0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x3b}], &(0x7f00000000c0)='GPL\x00', 0xe6, 0xfb, &(0x7f0000000300)=""/251}, 0x48) socketpair(0x3, 0xa, 0x101, &(0x7f0000000240)) 11:29:25 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x0, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:25 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa00000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230008900", 0x1132}) 11:29:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000006118000000000000000000000000001f9500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1}, 0x48) 11:29:26 executing program 0: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x12, 0x4, 0x4, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x5f, 0xa]}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/7, 0x7}], 0x1, &(0x7f0000000180)=""/180, 0xb4, 0x7}, 0x102) 11:29:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:26 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xeffdffff]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:26 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0x0, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:26 executing program 3: socketpair(0x8000000028, 0x0, 0x28, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 11:29:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000fb00", 0x1132}) 11:29:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x80007, 0x1, &(0x7f00000000c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) 11:29:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:26 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000700)='cgroup.max.descendants\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000680)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, 0x3, 0x2}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="41e353585305f0edd89c980464d82aaba8489f7ffee0dd9542dc0c59269ba663bf037226df502a21f8b5b04e", 0x2c}, {&(0x7f00000001c0)}, {&(0x7f0000000240)="23489a7852ca4fd4287589c8c7206eb8be03b4c75a5b8d8563cae2ae941dfc4982c038cb969b5c9b796a51388743e4a5d8eb66fbb46f237a2e1625312466bf75ab28d0cb726a99203fe92b6a7afb07534de7561e69179c9cb9090c88653719a51e87ac90a31f5bed3da6e5083a52eb74fd3eddca7e7c37eb34eafdede714ffc2928912decbbc287328fdb250325d4af63a1eca64b8479f6ec3a55c890868878104db2c6c0648de087b7d9d4f089a21859dcd5a7428df32e6", 0xb8}], 0x3, &(0x7f0000000380)=[{0xe0, 0x1ff, 0x10000, "fdbece955179849028f9cb1a4aac89636cf133ffc3d0dd8a77aae1e01b5210ecfc8f71d386bf6e303aa528d771cf23dbfd6c433e1f9222c0cd4e63f3943ba164cbea34486736f07da3699788f3d99b246b929f619c1ef81b96c10e9e0d922045fd54e12e0f6b92acba45503e7d5092fc4c1ce485830fd1557bae065da3ffb89085fbc12f8fde5d5cbb3f4c086d84e94e3041fdd7347abbfd07890d6474ebdaa390d6ab41edd03763e3fc6890f8ceddb907b67da4c72f7ede38b388a58541c42d9840dcb791a4709d29509ca5fc52fa39"}, {0x108, 0x84, 0x7, "744284cf03579a9dc211e7f4c97a1a27b4d4657224133b7cf0da0ce0e3d9ed28ca9b953453564fb235f13bfff878cc8626a32fdb93c59b2d7e083b31a4a6c87a4c40ee7287a807ed872f58926d0a0e209ce359e2aa4f79060b4676d92fe54c6b02b84c69a9aadff2771246f96d7ddb9204b554570ef772f8fd20b65d29e3ee8a40bfb0a32294f77a35bee144ef764b2186afe63aa596841e27ff8a77afeb908d97db921b8aa9b898f280a389f535b1a6a6d0ff12544d0564b13876e7b326f7d40d0a9bdc95f97316f7616c8ff37e6fc561e59aead7b6bd5224f4a78b6f90702e7a97c42b72392ff18ffa62499f1ae5d9ec22"}, {0xf8, 0x11f, 0x3ff, "b252470ef05b8bdf21890c642302f92b8d125027aacbd33052afcaf944b743c680de22b6b8a747d380683e533c9949f0fe91828aab52e2cca3039178ec5fdc52316cc2712c3394e05c362c0490f6efb6da9749377b26e5c2625e27edc90ea668fc76fc3fc094e2eb3220c770b584e60f4bd66c71bcdef3f1826adef431c7937230e1ba0be8565a095d2c8500e8ad3582b1217aeef60267ca394b91931490fb8549e6e02536b66e4c613f65a724db319f36acb603ff0a99643ab4b818ef98f9a0add830ca616c96fd7477b96405b658fd8a880e1430d300f22d0a1db311345303131d1c4ab5"}], 0x2e0}, 0x4000000) socketpair$unix(0x1, 0x8a9aabe0e22cd95c, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r4, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000001340), 0x361, &(0x7f00000013c0)}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x5452, &(0x7f0000000300)) setsockopt$sock_attach_bpf(r4, 0x6, 0x21, &(0x7f0000000200), 0x4) 11:29:26 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8906000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009300", 0x1132}) 11:29:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:26 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x0, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x10, 0x196}, 0xa8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) 11:29:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000000), &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x80007, 0x1, &(0x7f00000000c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) 11:29:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00l\x00', 0x1132}) 11:29:26 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x1100000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:26 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000000)="b90703e69ebf08", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x80007, 0x1, &(0x7f00000000c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) 11:29:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00A\x00', 0x1132}) 11:29:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:27 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:27 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x0, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:27 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x3f00000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1008", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230008f00", 0x1132}) 11:29:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x80007, 0x1, &(0x7f00000000c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) 11:29:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) 11:29:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xa, 0x80007, 0x1, &(0x7f00000000c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) 11:29:27 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x88a8ffff]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:27 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00N\x00', 0x1132}) 11:29:27 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) 11:29:27 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x6000000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x30472bf099bbb7ac, 0x3, 0x4, &(0x7f0000000180)) socketpair(0x1, 0x0, 0x200, &(0x7f00000003c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)="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", 0x2761, 0x0) recvmsg(r0, &(0x7f0000002640)={&(0x7f0000002380)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002400)=""/62, 0x3e}, {&(0x7f0000002440)=""/136, 0x88}, {&(0x7f0000002500)=""/74, 0x4a}], 0x3, &(0x7f00000025c0)=""/97, 0x61, 0x9}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251, 0x0, 0x0, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) 11:29:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00b\x00', 0x1132}) 11:29:27 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:27 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41}, 0x28) 11:29:27 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8035000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009100", 0x1132}) 11:29:27 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x0, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:28 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, &(0x7f0000000640)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64=0x0, @ANYRES64, @ANYPTR, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRESDEC, @ANYPTR], @ANYRES32=0x0, @ANYBLOB="207e34eb0232afeb4aca2a05f50ad21cf88ed4f5b05b2d070bd8e0f71aa1bd4af1f5dc0cdfb825f312f22a37a0d6f726042e7e154ea5e6260d83b915d0fb40b9a86e3cda082d914ec71188c81d18cf8d26745a42de84fb705ca4bb2aa63dd88acba78a91b5e14d24e3437e2552bb148451a7cd31d9e84bf0fe5e8d40de963ca734bf226ec2f30e8f9a5e5ba76c7d017bee54b6765107d6d8ff09b59ce1fa1c0cd9f94f1983080d44170fb94afd4ef6d03cf5a41e2a1accac63cd21ddcb7dd6e33d8507c47ffa8dcf52241aff58cf5faac6", @ANYRESDEC, @ANYRESHEX], @ANYRESHEX, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESOCT, @ANYRESHEX, @ANYBLOB="51f1d6ed8f5a4a4d81fc4690fc74fa9226feebe5d9f42619c9a8b93e6096fdcd3ce6ae8a5a549c55935025a773f3b00ccf19f968ffd8abdd2208634fc03a834ed65919976c847b0c0e3f38b91758a7f949a385f8382f24382483cb47e00058e37f228660ebb65919854bbc556930e7222b190f1e9f8f023c2b9d9f6c33bf2fee60b85da1736bd2dc795c5aa61798559ee4ed1451ead92c0fd5df8cf15e53211336e2b8c8c505e914ef70be48743b48c8d148983ffd2ddc807edb77ac02bb17b2253193d7b112ae4a5649b41c45974a2c8e0fdc5f", @ANYRES32, @ANYBLOB="2fa40f9c76ccfc6006c215dbeef85fd01ea8c635c09defc12b86e58eac7b423d32b46f7f4bcdc0e63c06e9591024083860881ab0ecc3204f75535fde8dc9685b0ab96da17d2bf61ee966d12335705a45b6de482ccba9ddc9ed75aa30b0dd989905d75efbba30e6fb1c15ca4d3d6e4beeda813a1a3b53608c5d2bde468a22f58e3b6cda4b0b670f0293d285e2eaa3d8226a236ff22903fd5772631d6545634f75c14a7302041bb9ee04cffbbd0a47037e9687d57d79df559469802c90c6ef6b869147ee907ca3126b2aa0", @ANYPTR64, @ANYRES64, @ANYRES64], @ANYRESHEX, @ANYBLOB="9637db00f987668d0bd5ef46a3da1d82284cdd2397a2534093a17dcdbc258c935fd22d9ac7da6e01abce7e35dc0d39150d5f638ac40a0e3b4c43aa8b1fcfc9b5236b8956ba788b25c7b1aef1a6377d8dbc67ab84f7d913ae8b8c24c71000c00ef79d2833c1835dd7118129b8c56d9f6e2c8af1978938d5374484bbb0fde268605ef2889574440eaea7d692fbd98e6c068ecf4a5ea2186d63712ef37f83fdd581187f800f8c85c0fd0f6b2c2a4d1cb8762cc78669858ab0676c720953f4dc88f89fac925c168301203d2e10b188b2c60073f99589f6e9b5fb80d11d1421eddd7ad8e012ab533ed10a2354d2f9ec01eefc399f", @ANYRES16, @ANYRES16=0x0, @ANYRES32], @ANYRES64=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0xfffffffffffffecb, 0x0, 0x40f00}, 0x48) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000017140)={&(0x7f0000015f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000016100)=[{&(0x7f0000016000)=""/106, 0x6a}, {&(0x7f0000016080)=""/97, 0x61}], 0x2, &(0x7f0000016140)=""/4096, 0x1000, 0x100000000}, 0x10000) r2 = socket$kcm(0x2, 0x5, 0x0) socketpair(0x11, 0x5, 0x7, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000002d40)=r0) setsockopt$sock_attach_bpf(r2, 0x84, 0x72, &(0x7f00000016c0), 0xfffd) bpf$PROG_LOAD(0x5, &(0x7f0000017180)={0x10, 0xa, &(0x7f0000000000)=@raw=[@alu={0x4, 0x5, 0xa, 0x0, 0x5, 0xfffffffffffffffc, 0xfffffffffffffff0}, @alu={0x7, 0x80000001, 0x0, 0x9, 0x7, 0xffffffffffffffe0, 0x8}, @map={0x18, 0x5, 0x1, 0x0, r0}, @exit, @alu={0x7, 0x81, 0xf, 0x9, 0x5, 0xfffffffffffffff8, 0xfffffffffffffffc}], &(0x7f0000000680)='GPL\x00', 0xfffffffffffffc00, 0x1000, &(0x7f00000006c0)=""/4096, 0x40f00, 0x1, [], r1, 0xf}, 0x48) recvmsg$kcm(r2, &(0x7f0000002cc0)={&(0x7f0000001700)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000001780)=""/168, 0xa8}, {&(0x7f0000001840)=""/54, 0x36}, {&(0x7f0000001880)=""/180, 0xb4}, {&(0x7f0000001940)=""/136, 0x88}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/83, 0x53}, {&(0x7f0000002a80)=""/196, 0xc4}, {&(0x7f0000002b80)=""/131, 0x83}], 0x8, 0x0, 0x0, 0x5}, 0x10000) 11:29:28 executing program 3 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:28 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xac050000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:28 executing program 0: socketpair(0x1b, 0x80002, 0x4, &(0x7f00000001c0)) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0) socketpair(0xa, 0x6, 0x10001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r2, 0x7, 0x2}, 0x10) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x2, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x2, &(0x7f0000001fd8)=@raw=[@map={0x18, 0x8, 0x1, 0x0, r1}], &(0x7f0000000000)='GPL\x00', 0x80, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 248.472512] FAULT_INJECTION: forcing a failure. [ 248.472512] name failslab, interval 1, probability 0, space 0, times 0 [ 248.500609] CPU: 0 PID: 18019 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #128 [ 248.508002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.517364] Call Trace: 11:29:28 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x0, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 248.519975] dump_stack+0x1c4/0x2b4 [ 248.523627] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.528866] should_fail.cold.4+0xa/0x17 [ 248.532945] ? find_held_lock+0x36/0x1c0 [ 248.537023] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.537044] ? __fget+0x4aa/0x740 [ 248.537062] ? graph_lock+0x170/0x170 [ 248.545619] ? kasan_check_read+0x11/0x20 [ 248.545639] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 248.545656] ? rcu_bh_qs+0xc0/0xc0 [ 248.545679] ? find_held_lock+0x36/0x1c0 [ 248.545720] ? ___might_sleep+0x1ed/0x300 11:29:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009f00", 0x1132}) [ 248.570741] ? __f_unlock_pos+0x19/0x20 [ 248.574740] ? arch_local_save_flags+0x40/0x40 [ 248.579339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 248.584908] __should_failslab+0x124/0x180 [ 248.589164] should_failslab+0x9/0x14 [ 248.592976] __kmalloc+0x2d4/0x760 [ 248.596536] ? __fget_light+0x2e9/0x430 [ 248.600530] ? bpf_test_init.isra.10+0x98/0x100 [ 248.605219] bpf_test_init.isra.10+0x98/0x100 [ 248.609731] bpf_prog_test_run_skb+0x103/0xcb0 [ 248.614318] ? cap_capable+0x1f9/0x260 [ 248.614343] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 248.614360] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 248.614372] ? fput+0x130/0x1a0 [ 248.614391] ? __bpf_prog_get+0x9b/0x290 [ 248.635979] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 248.640842] bpf_prog_test_run+0x130/0x1a0 [ 248.645097] __x64_sys_bpf+0x3d8/0x520 [ 248.648994] ? bpf_prog_get+0x20/0x20 [ 248.652817] do_syscall_64+0x1b9/0x820 [ 248.656715] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 248.662083] ? syscall_return_slowpath+0x5e0/0x5e0 [ 248.667021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.671871] ? trace_hardirqs_on_caller+0x310/0x310 [ 248.676891] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 248.681914] ? prepare_exit_to_usermode+0x291/0x3b0 [ 248.686940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.691797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.696992] RIP: 0033:0x457569 [ 248.700188] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:29:28 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x0, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 248.719089] RSP: 002b:00007f4d56cd7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 248.726807] RAX: ffffffffffffffda RBX: 00007f4d56cd7c90 RCX: 0000000000457569 [ 248.734085] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 248.741361] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 248.748627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d56cd86d4 [ 248.755895] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000004 11:29:28 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x0, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:28 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8100]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:28 executing program 3 (fault-call:1 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\\\x00', 0x1132}) 11:29:28 executing program 5: socketpair(0x4, 0x1000000001, 0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff4d}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000002c0)=@rc, 0x80, &(0x7f0000000380)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001480)=""/4096, 0xd30}, 0x10000) sendmsg$kcm(r0, &(0x7f0000002a00)={&(0x7f0000002640)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)="f0afea1a112ac2bf10a9c12b0a5c077e581ff7a2", 0x14}], 0x1, &(0x7f00000026c0)=[{0xb8, 0x116, 0x10001, "0e513e9148b8b7c00928d570bfbbde2e2fbea7630333c6a1f4a7fa289293bf24ee96750fa8d9bf10b10fd99d3e797a4784ba5ca53fab5bb64c98531413b2acdd06865e42bf2417bdd78263734362e2ea4e092c5f30fab089522f0cb4a7b9d6af2e711d1eb7a15299d04aa0b70225abefc3bfc42da9557c98a3ac7b8a98665ee57ff68ac92e9e9929eded324992f9b99a924a583c2b223e5b55c44bba8134a034f3"}, {0x10, 0x103, 0x1000}, {0x28, 0x107, 0xfff, "bcf193c476dc6c365339f510d0b507d88905116bf3ae76"}, {0xd8, 0x11, 0x9000000, "5aa749acc9dbf07c1b00130fd5b0624cb383300617f940e8ff599d69fa5bb50626ca85768e71a851854267c988d3f544f7363ff329b9959d9bbe2bce3eae4986efe0058e6e03f6501ee56f2b6b95d56a1fa662f24f362c2b6d5927cb56b1c51d58abc414f9c1292d15f52dd82909b1e873007ef770f1089409b8e260360a2d4f14c722fe85330da4bb0805e17578da4632bf6252e208dd9f245c0f36452bc3dbd261597de74625dcfc7848118b33f5034df2e5062190181f58b514a8438d87d83a4bd048"}, {0xe0, 0x100, 0x4, "2782203e1d795cd61654d5df4d74ddb37729e2ca557cade6481c26cb528efdde483124ca4cff479e606ed353c26071c64d2b80a9e2a407a33ea8fbae96c8674d4e9de304e3eabe880dd1183e8ca5a694b4a60f85f6860def006c98ba4e157f1070d66164a57e897312fdbcfd22b68c9ea3d469183a564ffdc96e2933f72d1101a55fcc36fe73d1e4db00290e0765a1ea612dc7e42d8e76e2fe20463d981ce6dc0073f028b4b2436d19b8cbf11dfa85dbbad064b18eaa5a1e11005ad39b019b18f61355258486ddddb463cc4c1f"}, {0x88, 0x10a, 0x67a, "153304e8f556dcd2b46f9fd3f72ecae039a1b7f36c427f8e56620697b2ff969f7e9b7539bf0164093bae8f322aa3e404c7924d5f0a577ab12df2c533338545c6f3fe0515304d4774838257a259d60bdbeaf9fbe37976ebdda055e565a583df645e1df1fe0aef3b18b2f3749dc13dd0f254ebc1eb"}, {0x10, 0x119}], 0x340, 0x4000010}, 0x4000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000002480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xfc, 0x9, {"c3b2c92cbe5cef92e74ceb47cb4f8b335b4cbe7d33cce8ba8b504623d691f00f2c6302ef2cd209f84bcd9213b0df2c8d238cbe0aaf614df719a7993ba6c0bfa5a4ca994f130d8fedb43f12857af8f22b58af6d9383345391e00bee9ad8e0e58268e109eaa742b636157b1818195eb83356b569fb241993b2b5eb10f7206b57e8e8e6c4a1804ac705ea5caa25999c360f9a0f1ece5526557ea3551b90b7f82fe55038153f8c3f389ba45d649f7b1a87f24f328ea0a2c1837bf2b3308375d87fdd6efc8c6cec3df5f592c5e6b82f1eaf471721ee26c7c867620ec82bff67cabca26c077fc3"}}, {0x0, "aed7060da79beb77bb47afe5913bd132e95e563126672ae25c3f5cb60331831e76e515913c45be8b41d12bb96dfed881457d2abce090559d3b4f07f0f6eaf1178d8a70410216b8c6e5217aec38b884e3e2de796ba945697b882aba3ad8bf8ade14efedae4d5e9efe269c4000a0d30b1da20543c5e8582ea254e2b3a0ebeab8970d7f047de071359bc35fbcd501d64b834cd61967d9b93ad0c1f337801acd50a1104653f6a3d13913f5c7b008281d9250a616b2c63f884274dc44f528"}}, &(0x7f00000013c0)=""/165, 0x1ba, 0xa5, 0x1}, 0x20) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000002a80)=0x400) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x3d, &(0x7f0000000000)}, 0x0) close(r0) 11:29:28 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x0, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 249.042307] FAULT_INJECTION: forcing a failure. [ 249.042307] name failslab, interval 1, probability 0, space 0, times 0 11:29:28 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x0, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 249.094772] CPU: 0 PID: 18058 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #128 [ 249.102207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.111583] Call Trace: [ 249.114194] dump_stack+0x1c4/0x2b4 [ 249.117875] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.123106] should_fail.cold.4+0xa/0x17 [ 249.123137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.132291] ? save_stack+0x43/0xd0 [ 249.135929] ? kasan_kmalloc+0xc7/0xe0 [ 249.135945] ? __kmalloc+0x14e/0x760 [ 249.135961] ? bpf_test_init.isra.10+0x98/0x100 [ 249.135980] ? bpf_prog_test_run_skb+0x103/0xcb0 [ 249.143591] ? graph_lock+0x170/0x170 [ 249.143610] ? rcu_bh_qs+0xc0/0xc0 [ 249.143632] ? find_held_lock+0x36/0x1c0 [ 249.156850] ? find_held_lock+0x36/0x1c0 [ 249.156893] ? ___might_sleep+0x1ed/0x300 [ 249.164485] ? arch_local_save_flags+0x40/0x40 [ 249.164517] __should_failslab+0x124/0x180 [ 249.181509] should_failslab+0x9/0x14 [ 249.181529] kmem_cache_alloc_trace+0x2d7/0x750 [ 249.181550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.181570] ? bpf_test_init.isra.10+0x70/0x100 [ 249.200235] bpf_prog_test_run_skb+0x1d4/0xcb0 [ 249.204828] ? cap_capable+0x1f9/0x260 [ 249.204866] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 249.204883] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 249.204896] ? fput+0x130/0x1a0 [ 249.204914] ? __bpf_prog_get+0x9b/0x290 [ 249.204933] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 249.204947] bpf_prog_test_run+0x130/0x1a0 [ 249.204970] __x64_sys_bpf+0x3d8/0x520 [ 249.219229] ? bpf_prog_get+0x20/0x20 [ 249.219270] do_syscall_64+0x1b9/0x820 [ 249.219289] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.219310] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.226641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.226662] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.226680] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.226699] ? prepare_exit_to_usermode+0x291/0x3b0 [ 249.226722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.226750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.226763] RIP: 0033:0x457569 11:29:29 executing program 3 (fault-call:1 fault-nth:2): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 249.226781] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.235847] RSP: 002b:00007f4d56cd7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 249.235864] RAX: ffffffffffffffda RBX: 00007f4d56cd7c90 RCX: 0000000000457569 [ 249.235874] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 249.235884] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 11:29:29 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xfffffdef]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 249.235894] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d56cd86d4 [ 249.235903] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000004 11:29:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001080)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f00000010c0)=@ax25={0x3, {"2202344a41f328"}, 0x9}, 0x80, &(0x7f0000001440)=[{&(0x7f0000001140)="53330a87166f7a", 0x7}, {&(0x7f0000001180)="5b06f6bea3381a73c6348b91c87664833b2d33bbd80310b8458e1227c9e280a81b3b36b392e0824961e615f4dc69dfd34500b78966963b6931bfcec8f12cb52523204a2e9aa0b42d409e0b8fa852c879138c0cefebfe7d28b0ebb39a026d9d5e3e324a7eed96a9cfc7abeff85b34d7d02223a6ddbba26fb55a118618f36c3e3a379f52b1d2", 0x85}, {&(0x7f0000001240)="e584262d3a1702f2407e9c81dde293460f6be4a92db400a9fbf8d0e2fc1288175c34d9fc4466b9b71a30a04c846ffdea23db5b0cac9ce92fbcf1b24ded4dfdd0ec569bcd82db81382e78878a15673b59fc14a2574275fd583b8ac9c90594be19061bda4367df07c28556ae33853b9d26ea2aa01ec5dd8976b0f76eb35feca90b2676c996fed19cd51d0e058d5e22d38fac8535f09b0424f3b566d117bfa0965e174fe68dd8f6d545dc4ec17b7985de875f91345d685feb36759ed7c264518f364dab36ba", 0xc4}, {&(0x7f0000001340)="9b8bc9a32a93f8bda62c4a8e47a85b453d17d4cadce23fe93e13569457fc312b037d9def4ab2c21adc6d92a48e81b2ccf13f8f6371c697d64f3bf1dee7821a47c025f8669fa39f3638824aaccf130f23eabf876eec683d2c31ab0c8a4e63a134abe6a8cc28fe26339f52ae8188dd8f7aed5e8b53876d244bfe00666d63a6674b15", 0x81}, {&(0x7f0000001400)="1d8bfba6e453", 0x6}], 0x5, 0x0, 0x0, 0x40080}, 0x4000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0x1ecac}], 0x1, &(0x7f0000002a40)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200), 0xfc99}], 0x1}, 0x0) close(0xffffffffffffffff) [ 249.425514] FAULT_INJECTION: forcing a failure. [ 249.425514] name failslab, interval 1, probability 0, space 0, times 0 [ 249.464061] CPU: 0 PID: 18084 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #128 [ 249.471511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.480875] Call Trace: [ 249.483487] dump_stack+0x1c4/0x2b4 [ 249.487145] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.487169] ? kasan_check_read+0x11/0x20 [ 249.487192] ? __debug_object_init+0x57d/0x1290 [ 249.487218] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 249.496551] should_fail.cold.4+0xa/0x17 [ 249.496579] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.496603] ? __debug_object_init+0x57d/0x1290 [ 249.496622] ? rcu_bh_qs+0xc0/0xc0 11:29:29 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x0, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 249.496641] ? unwind_dump+0x190/0x190 [ 249.527988] ? debug_object_free+0x690/0x690 [ 249.532419] ? is_bpf_text_address+0xd3/0x170 [ 249.536934] ? kernel_text_address+0x79/0xf0 [ 249.541362] ? __kernel_text_address+0xd/0x40 [ 249.545881] ? unwind_get_return_address+0x61/0xa0 [ 249.550825] ? __save_stack_trace+0x8d/0xf0 [ 249.555186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.560826] ? check_preemption_disabled+0x48/0x200 [ 249.565882] ? check_preemption_disabled+0x48/0x200 [ 249.570925] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 249.576220] ? kasan_kmalloc+0xc7/0xe0 [ 249.580131] ? rcu_pm_notify+0xc0/0xc0 [ 249.584047] __should_failslab+0x124/0x180 [ 249.588287] should_failslab+0x9/0x14 [ 249.592077] kmem_cache_alloc+0x47/0x730 [ 249.596137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.601661] ? __phys_addr+0xa6/0x120 [ 249.605448] ? kasan_unpoison_shadow+0x35/0x50 [ 249.610024] __build_skb+0xab/0x430 [ 249.613641] ? skb_try_coalesce+0x1b70/0x1b70 [ 249.618129] ? kasan_check_write+0x14/0x20 [ 249.622351] ? sock_init_data+0x9b1/0xdc0 [ 249.626487] ? rcu_pm_notify+0xc0/0xc0 [ 249.630365] ? sk_stop_timer+0x50/0x50 [ 249.634250] build_skb+0x77/0x270 [ 249.637717] ? rcu_read_lock_sched_held+0x108/0x120 [ 249.642731] ? __build_skb+0x430/0x430 [ 249.646624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 249.652163] ? bpf_test_init.isra.10+0x70/0x100 [ 249.656852] bpf_prog_test_run_skb+0x283/0xcb0 [ 249.661429] ? cap_capable+0x1f9/0x260 [ 249.665310] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 249.670140] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 249.675671] ? fput+0x130/0x1a0 [ 249.678955] ? __bpf_prog_get+0x9b/0x290 [ 249.683006] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 249.687845] bpf_prog_test_run+0x130/0x1a0 [ 249.692072] __x64_sys_bpf+0x3d8/0x520 [ 249.695951] ? bpf_prog_get+0x20/0x20 [ 249.699768] do_syscall_64+0x1b9/0x820 [ 249.703651] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.709003] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.713920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.718764] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.723782] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.728797] ? prepare_exit_to_usermode+0x291/0x3b0 [ 249.733829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.738677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.743864] RIP: 0033:0x457569 [ 249.747046] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.765936] RSP: 002b:00007f4d56cd7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:29:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x909b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f00000000c0)=0xff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) [ 249.773640] RAX: ffffffffffffffda RBX: 00007f4d56cd7c90 RCX: 0000000000457569 [ 249.780897] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 249.788154] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 249.795407] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d56cd86d4 [ 249.802713] R13: 00000000004bd892 R14: 00000000004cc208 R15: 0000000000000004 11:29:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'yam0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x0, 0x2, 0xbb, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000280)=0x79f9) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:29:29 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f100", 0x1132}) 11:29:29 executing program 3 (fault-call:1 fault-nth:3): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 249.936243] FAULT_INJECTION: forcing a failure. [ 249.936243] name failslab, interval 1, probability 0, space 0, times 0 [ 249.947781] CPU: 0 PID: 18111 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #128 [ 249.955183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.964547] Call Trace: [ 249.967163] dump_stack+0x1c4/0x2b4 [ 249.970822] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.976049] ? zap_class+0x640/0x640 [ 249.979809] should_fail.cold.4+0xa/0x17 [ 249.983907] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.989057] ? print_usage_bug+0xc0/0xc0 [ 249.993367] ? is_bpf_text_address+0xac/0x170 [ 249.997882] ? lock_downgrade+0x900/0x900 [ 250.002045] ? check_preemption_disabled+0x48/0x200 [ 250.007102] ? rcu_bh_qs+0xc0/0xc0 [ 250.010661] ? __lock_acquire+0x7ec/0x4ec0 [ 250.014915] ? is_bpf_text_address+0xd3/0x170 [ 250.019421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.024975] ? check_preemption_disabled+0x48/0x200 [ 250.030009] __should_failslab+0x124/0x180 [ 250.034285] should_failslab+0x9/0x14 [ 250.038103] kmem_cache_alloc+0x47/0x730 [ 250.042179] ? zap_class+0x640/0x640 [ 250.045913] skb_clone+0x1bb/0x500 [ 250.049466] ? skb_split+0x11e0/0x11e0 [ 250.053363] ? kmem_cache_alloc+0x12e/0x730 [ 250.057698] ? build_skb+0x77/0x270 [ 250.061335] ? bpf_prog_test_run_skb+0x283/0xcb0 [ 250.066103] ? bpf_prog_test_run+0x130/0x1a0 [ 250.070521] ? __x64_sys_bpf+0x3d8/0x520 [ 250.074594] ? do_syscall_64+0x1b9/0x820 [ 250.078681] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.084058] ? kernel_text_address+0x79/0xf0 [ 250.088481] ? __kernel_text_address+0xd/0x40 [ 250.093007] bpf_clone_redirect+0xb9/0x490 [ 250.097268] bpf_prog_c39d1ba309a769f7+0xd37/0x1000 [ 250.102297] ? genl_register_family+0x5b0/0x1510 [ 250.107062] ? lock_downgrade+0x900/0x900 [ 250.111229] ? ktime_get+0x352/0x440 [ 250.114964] ? pvclock_read_flags+0x160/0x160 [ 250.119470] ? bpf_test_run+0x175/0x780 [ 250.123454] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 250.128925] ? lock_acquire+0x1ed/0x520 [ 250.132909] ? bpf_test_run+0x3cb/0x780 [ 250.136895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 250.142448] ? check_preemption_disabled+0x48/0x200 [ 250.147489] ? kasan_check_read+0x11/0x20 [ 250.151650] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 250.156947] ? rcu_bh_qs+0xc0/0xc0 [ 250.160496] ? bpf_cgroup_storage_release+0x220/0x220 [ 250.165699] ? skb_try_coalesce+0x1b70/0x1b70 [ 250.170221] ? bpf_test_run+0x25d/0x780 [ 250.174217] ? netlink_diag_dump+0x2a0/0x2a0 [ 250.178641] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 250.184186] ? bpf_test_init.isra.10+0x70/0x100 [ 250.188881] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 250.193658] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 250.198510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 250.204057] ? fput+0x130/0x1a0 [ 250.207354] ? __bpf_prog_get+0x9b/0x290 [ 250.211430] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 250.216286] ? bpf_prog_test_run+0x130/0x1a0 [ 250.220711] ? __x64_sys_bpf+0x3d8/0x520 [ 250.224784] ? bpf_prog_get+0x20/0x20 [ 250.228623] ? do_syscall_64+0x1b9/0x820 [ 250.232697] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 250.238072] ? syscall_return_slowpath+0x5e0/0x5e0 [ 250.243016] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.247877] ? trace_hardirqs_on_caller+0x310/0x310 [ 250.252906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 250.257936] ? prepare_exit_to_usermode+0x291/0x3b0 [ 250.262968] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.267843] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:29:30 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x5865]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:30 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0x0, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:30 executing program 3 (fault-call:1 fault-nth:4): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001900", 0x1132}) 11:29:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="b40000ec2494f300000000009c000000000000001f00000000000000000000000000000095000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 11:29:30 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8864000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:30 executing program 5: r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0xe31a, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970600dc0d") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x6, 0x12) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000d00)="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") perf_event_open(&(0x7f0000000440)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1000) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) sendmsg$kcm(r2, &(0x7f00000004c0)={&(0x7f0000000a00)=@ax25={0x3, {"38adf7452075bc"}, 0x3}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000003400)=ANY=[]}, 0x4000) 11:29:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:30 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'yam0\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) socketpair(0x0, 0x2, 0xbb, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r1) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000280)=0x79f9) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:29:30 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00p\x00', 0x1132}) [ 250.801249] net_ratelimit: 234 callbacks suppressed [ 250.801259] protocol 0800 is buggy, dev ip6_vti0 [ 250.817348] protocol 0800 is buggy, dev ip6_vti0 [ 250.835895] device lo left promiscuous mode 11:29:30 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x40030000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc39eb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x69, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xea, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 251.433287] device lo entered promiscuous mode [ 251.452669] device lo left promiscuous mode 11:29:31 executing program 5: r0 = gettid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0xe31a, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970600dc0d") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x6, 0x12) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000d00)="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") perf_event_open(&(0x7f0000000440)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000003c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1000) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) sendmsg$kcm(r2, &(0x7f00000004c0)={&(0x7f0000000a00)=@ax25={0x3, {"38adf7452075bc"}, 0x3}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000003400)=ANY=[]}, 0x4000) 11:29:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:31 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, 0x0, 0xb, r4, 0x8) r5 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r5, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:31 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8035]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 251.664306] device lo entered promiscuous mode 11:29:31 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000bb00", 0x1132}) 11:29:31 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0x0, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc39e1, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:31 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0x0, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) [ 251.861816] device lo left promiscuous mode 11:29:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:31 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa805]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 252.336156] device lo entered promiscuous mode 11:29:32 executing program 5: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000300)={r2}) write$cgroup_subtree(r3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x119) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="6caf1107cc517f04e78127483ccc5ee50c6ee2d8ac00c9761e4f3f27b4b8cac3771e1e78cb86e7e54933d87ed5e1173dbe180485e77ada7a9907fa9718c534e7f91723622a2b4c33b05961a6fa0d84d449044eb4eae5b5b4092e3cf74226ec14b675ab5a51bb877c847d2334b8a61b4b08fab3be9ab57889663f097f88f21ff829a570c036c3742d529116cdcc6f764f1240afae4cae15377d2012ba74429955a221edb4f7be87502563d220838a104556e771270de63124ba3d6b3843894d4cf709cfc0e969a54eaea3b06bc80be6c4c72ef80e8e0780b3", @ANYRES32=r1], 0xdc) openat$cgroup_procs(r4, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x0, 0x5000000) openat$cgroup_ro(r5, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)="e367726f75702e70726f6b7300", 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000200)={'irlan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000080)) 11:29:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xfa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:32 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000800)='cgroupwlan1^\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f00000004c0)="73761230ff", 0x1ff) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000ac0)) r4 = openat$cgroup_ro(r3, &(0x7f0000000a40)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) close(r4) write$cgroup_int(r4, &(0x7f0000000440)=0x80, 0x12) r5 = perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0xfe6f, 0x0, 0x40, 0x2, 0x0, 0x7, 0x10001, 0xf, 0x97b5, 0x0, 0xffffffffffffde0e, 0x0, 0x10001, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x5, 0x401, 0x4, 0x0, 0x3fe0000, 0x10001, 0x7ff, 0x8, 0x5, 0x6, 0xfffffffffffffeff, 0x7ff, 0x4, 0x7fff, 0x80000000, 0x0, 0x8000000000000000, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x800, 0x46d, 0xffffffffffffffff, 0x7, 0x7, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r4, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0xffffffffffffffdb) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x8}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r4, 0x28, &(0x7f0000000b40)}, 0x10) socketpair(0x1f, 0x80006, 0xb36, &(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) ioctl$TUNSETVNETLE(r4, 0x400454dc, &(0x7f0000000100)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={r6, 0xb, 0x800000000008}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x7ff, 0x6, 0x5, 0x0, 0x0, 0x200, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x80000000, 0x0, 0x3f, 0x7, 0x0, 0x7, 0x45f3036e, 0x5, 0x2, 0x3, 0x463, 0x4660fe0a, 0x4, 0x6, 0x4, 0x3f, 0x0, 0x87, 0x1, 0x7, 0x7, 0x3cc, 0x3, 0x62a5, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000002c0), 0x8}, 0x0, 0x0, 0x4d8, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0xfffffffffffffff7) ioctl$TUNSETVNETLE(r7, 0x400454dc, &(0x7f0000000540)) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f00000007c0)=r3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000240)={r8}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={r5, 0x10, &(0x7f0000000140)={&(0x7f0000000980)=""/105, 0x69, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r4, 0x10, &(0x7f0000000500)={&(0x7f00000005c0)=""/156, 0x9c, r9}}, 0x338) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=r10, 0x4) 11:29:32 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, 0xffffffffffffffff, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000d300", 0x1132}) 11:29:32 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xe]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:32 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x0) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000ff00", 0x1132}) 11:29:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)="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", 0x0, 0x0) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0x1c, 0x9, &(0x7f00000000c0)="3c0f397a8c13d411bb8fdb387516ffe6d82697a9ecbab5a6b64ca021", &(0x7f0000000040)=""/9, 0x3}, 0xfffffffffffffd63) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x400803) 11:29:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 252.693587] audit: type=1804 audit(1540034972.394:66): pid=18265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir922223607/syzkaller.JPKw80/368/memory.events" dev="sda1" ino=17229 res=1 11:29:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0xf, 0x7, 0x8c0, 0xffffffffffffff7e, 0x3e, 0xffffffffffffffff, 0x200}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000700)={r3, &(0x7f0000000540)="e9784a21aa5c1d5ca23535a57e8bea591517738f23d1c14eea27fe9da181a653076300e24fc343602c59afc9f3613fc90551aa210f4a6250c25b1366f6bd81e5b01e180c87b50bd35c159f1c3df661a4331cd37c9d173b4464e353382754ba36cbe66e56c48cb2b3420bdc2bdc9fac332a2c37096d07fb21be8eb6742bd9933581c227c163fa21086a56242e0422f61d8175a7a3143d7f0f08ec68fd9f60baf10644d90157795675ba9794774a05", &(0x7f0000000600)="0958001babf40026596b0db4367b61bfae34a1e4271568e00586ae1292b2574aefe59e3f13907662a0aab657314452f25f2eefba18c97ac687010e786b64c7337b82c51ca29ec9ff11a3b46afb7d87dc6c206ca73baca210fe968fa71be4f53390a0d0b984105e9a40223c1e8808816afad52697d358186706d77f0fa034de41a83d2a911eb82a7491eacc57fff49323336e77306719b6d4f8fc435ba98c779f86958a82d571d7d2c57b20f5ed941d36c2abbc0189b21fccb075562bc706c928ec7f9d99f6ee025a", 0x2}, 0x20) r4 = openat$cgroup_type(r2, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) r5 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000740)) r6 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x5, 0x3f, 0x0, 0x401, 0x0, 0x8, 0x2, 0x1, 0x4, 0x2, 0x2f80, 0x7ff, 0x4, 0xfffffffffffffffa, 0x4, 0x71, 0x1, 0x8, 0x80, 0x0, 0x33, 0xffff, 0x100, 0x3, 0x8001, 0x4, 0x8, 0xffff, 0x0, 0x2c21, 0x3, 0x6, 0x4, 0x5c, 0x6, 0x9, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x9}, 0x804, 0x7, 0xffffffffffffff00, 0x7, 0x81, 0x400, 0x1}, r5, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) close(r4) r7 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r9, 0x4) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f00000008c0)={r8}) 11:29:32 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8000a0ffffffff]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 252.832395] audit: type=1800 audit(1540034972.394:67): pid=18265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor5" name="memory.events" dev="sda1" ino=17229 res=0 11:29:32 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000001a40)={&(0x7f0000000500)=@rc={0x1f, {0x2, 0x9, 0x7, 0x4, 0x401, 0x3ef}, 0x8eb}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000580)="a24ff167d508d2e7ec211b9633305411d7a35f15b61ee61c2a2c983e765deb5406f3a3914244441a80314cdad853b56b57631e0dad54c9adfbba44177e95e7f5460db4772dec93db78f08f", 0x4b}, {&(0x7f0000000600)="57734980c9ecdb95fdf86cece60033615a0a8363ba1a0b8832c67d99a57dd02ddb6fb125a440d830d1fdbbe9b1363cd91751b7ee4317a13f7a5cf8207a00c4edcd1cd253e6b6dcd2571c4956e43e1b66549ae8be07424626379b2d826bf1af4fd5c635143e16a984d2885e1f4c5d0068c5251d1a9fd33e3c2c3cb3eff4c02a4c3b2c73f8aa640b4af713a828e485b61424eebe0c3ec3cdcd4e62f51afe0dd3567787d2703980ce2fe1f18603ee23314a1f1be906c874bc8967dae189325140e9b092eb3789b6030e75d1016becf8999295d28a26c457122ac237623cc4743bc1cd3030", 0xe3}, {&(0x7f0000000700)="d7e192917d69c4ca93c187c47062293b9c4f6b398a8a2a34e176fab92238ad39555d4af976a4edc180e735ace3a8a04937a78614f63be6be89a4c851769504e55cd153c35d6bae7be0935c66b2d429882caac80b8a6287492b813fb0618a98c349bd7c899672ac8ed5d6a85cf80bc8fdb5c3aa7eb3f3429ff4c11ca13a0a88d04cd5e8f9a3c6b138a917c627e8d9ea3d200aeede8d9be2fa4d45138d128e95f6dbee054a217eddf19a650078ffbf649155e5dec6d43aabd533e9c18e0b70e455d34c9a9c7c32a6", 0xc7}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="ff3cfc404f6bda45904ebb1df0ccaf7ba7901dab244a2df758eaec2c12926a27cc00fb915d1fe8b5a2f9beeb7a1b84027ad0ce6163c5fae8ddab351ebd2ef58f3b2b25134887858ae3d5bd06a6856dc8b457e1249ca70e58cf6b61ecd547f68a5369e97df8c7ffcb9546c73aee4e6f68714177355d08a52077e66ec21875f5d882310d0d8cccc7b3e5bbb91f1c534e99f5c59a7c435f57ab92fbf1bb0ff94cb6f2b73462dc1b2c993a21248987e2afa5cea0e7e8c126a6d215bf917aa3fea01058498c1c6906b7e12b98eb8c6a9277701e8aa472c79eb9601545ccf10b5e703057", 0xe1}, {&(0x7f0000001900)="6eec6e673bc1e6e60f81c0020d2212ba369527c82889cfdd38bf572d85265f5ff0753b2e701e539d0704a8e07950a55a6667c1a72800d1cd8329e8fcf79e66dd5cc89c9452d3b049660e64e6e88bd7826a3563a0353759b3f23c18bf63a32e8777ef60ed2b75e13b5a6fc29eb251c8077998494aedc125166255759a961e2b29963603aa8fb0484a4800d057afb76de0d61106eb3477d9714bb6d4620fa0cff759", 0xa1}], 0x6, &(0x7f0000004000)=[{0x48, 0x0, 0xd, "e59ba38f290c3b29d8f4d5fa7753292c7e8a53f68e0f1276c5d5d9cb15dbfca4fff83af77efa2fcd6824f82c016592b663021b637b72bf77"}, {0x1010, 0x84, 0x478, "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"}, {0x1010, 0x11f, 0xfffffffffffffffd, "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"}, {0x78, 0x10b, 0x1ff, "ec748a2e6417745cfce5e9213d79478e2247c175849f6c62db377fcd265ad9b9800a29a4b821579089ab4ee0e542d610dddc9ac8d1872555eae93125c8187611999a7e5755e05ea13d3c1baa9b5c6dce22ab3009dc8c0c09fc854afae5e8ff85d90868df"}, {0x70, 0x29, 0x1, "489bd07b21b7cd62470d919844f662059d15137544373fb05fee4003e032b73fee634c28e4eb2f3c9b62bd32b2dd567e0db3845633a66fe479ce0bf6a7354ae9173be32aac58d8ebe5009682dadfa0bc9b96e91528e327adc5dee08c0b4b"}, {0x30, 0x103, 0x3ff, "d4d70f0e8bcdc2548642e90bf8275019b5665488dd187d1307c5"}], 0x2180, 0x40000d4}, 0x4000840) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="8500000031000000f427e06ecc2500000000000000950000997a86be58785b2f1cb3f694c945a2768ccdb5c02dea557350e0b4d182b1a2433eb4bd3ee12d6bc72d088819b8f98d98c271104466531ce512de74bcc0597149383f1e1944d53662eb093b3ee62e6381c70662d70fb16efbceae447fb08bad64ba6e2c31181528822a12edcb08db690bfde96959d1b8cbffec98bfa48bbe7e4c2089f0b01853570a8add969dd08613e5a0d2b9a5316ecec1a4be79eb56d9701fa29737fe5a50bb5f0c39d6396ac2bea2efe7f2ebcc2baf6f0c622a19de5a1fdee10fe52e451aa5945ac326ca2156ea3f54404b8a309a9816d05e6017e49c767b296d56e121b357a7538d82ade7b09ddab1b733c9553383f958c8d8b6559c91"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000080)={r0}) 11:29:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:32 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000ca00", 0x1132}) 11:29:32 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x0) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e9670402e2b7216e24"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3000000, 0x25}, [@ldst={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffb0}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 11:29:32 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x6558]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:32 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00Z\x00', 0x1132}) 11:29:33 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:33 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0a00fffffffffd630120"], &(0x7f0000000000)="47504c00bc2e070000004823122000000000000000000000000000", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) socketpair(0xa, 0x800, 0x6, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xff) 11:29:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x40122000000003, 0x11) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socket$kcm(0xa, 0x2, 0x11) socketpair(0x0, 0x100000, 0x0, &(0x7f0000000740)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x100000000002, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003980)) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x20000000000002, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x10, 0x3, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0x2, &(0x7f0000000080)=r2, 0x4) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) getpid() getpid() openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 11:29:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000d200", 0x1132}) 11:29:33 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x806]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:33 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:33 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8848000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x37, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:33 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() getpid() r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x9, 0x1, 0x20, 0x0, 0x88e3, 0x4000, 0x3, 0x1, 0x7, 0x0, 0x0, 0x7fff, 0x2, 0xc5, 0x7e45, 0x3, 0x400, 0x8, 0x3, 0x3, 0x2000000004, 0x9f98, 0x6, 0x7, 0x0, 0x1f, 0x4e, 0x8000, 0x8, 0x10000, 0x8, 0x8, 0x9, 0xb770, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x20, 0x3f}, 0x800, 0x3f, 0x9, 0x6, 0x10000, 0x7, 0x7ff}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x1000, 0x4, 0x4a, 0x200, 0x0, 0x6, 0x48, 0x1, 0x0, 0x9, 0x100, 0x0, 0x9, 0x8, 0x3, 0xfffffffffffffff9, 0x5, 0x3, 0xffff, 0xff, 0x400, 0x401, 0x4, 0xa7, 0x20, 0x62, 0x5, 0x40, 0x5, 0x8, 0x2, 0x9, 0x1, 0x7, 0x8, 0x4, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f00000000c0), 0xf}, 0x2000, 0x48000000000000, 0x0, 0x3, 0x6, 0x81, 0xfff}, r1, 0x7, r2, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="b70c44731d8eb76d14aef4ff752500000700000000f84000ffc09d8b9505000000bf1300000000aaaee0ed55d06a980900008572e78af500000006000000b700000000000000850000ff0000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x28000000e9030000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0e64d082778c3938", &(0x7f0000000380)=""/85, 0x700}, 0x28) 11:29:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001d00", 0x1132}) 11:29:33 executing program 5: r0 = socket$kcm(0xa, 0x20000007, 0x11) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0xfcfa) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x4, &(0x7f0000000140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000180)='GPL\x00', 0x1f, 0x40, &(0x7f00000001c0)=""/64, 0x41000, 0x1, [], 0x0, 0xa}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000ac0)={&(0x7f0000000a80)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)={0xb, 0x0, 0x9, 0x92b, 0x38, r1, 0x4}, 0x2c) recvmsg(r0, &(0x7f0000000080)={&(0x7f0000000340)=@alg, 0x80, &(0x7f0000000940)=[{&(0x7f00000003c0)=""/92, 0x5c}, {&(0x7f0000000440)=""/202, 0xca}, {&(0x7f0000000540)=""/173, 0xad}, {&(0x7f0000000600)=""/84, 0x54}, {&(0x7f0000000680)=""/192, 0xc0}, {&(0x7f0000000740)=""/200, 0xc8}, {&(0x7f0000000840)=""/79, 0x4f}, {&(0x7f00000008c0)=""/68, 0x44}], 0x8, &(0x7f00000009c0)=""/140, 0x8c, 0x6}, 0x10000) recvmsg(r0, &(0x7f0000001180)={&(0x7f0000000b40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000bc0)=""/192, 0xc0}, {&(0x7f0000000c80)=""/204, 0xcc}, {&(0x7f0000000d80)=""/209, 0xd1}, {&(0x7f0000000e80)=""/255, 0xff}, {&(0x7f0000000f80)=""/12, 0xc}, {&(0x7f0000000fc0)=""/128, 0x80}, {&(0x7f0000001040)=""/69, 0x45}], 0x7, &(0x7f0000001140)=""/54, 0x36, 0x9}, 0x10001) socketpair(0xa, 0x1, 0xfffffffffffffff9, &(0x7f0000000280)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0), 0x4) setsockopt$sock_attach_bpf(r0, 0x29, 0x4a, &(0x7f0000000300)=r2, 0x1f) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) 11:29:33 executing program 0: socket$kcm(0xa, 0x2, 0x11) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0x40}, {0x0, "a62c0d027421858755676c0bd246dca53c27425e60d24130853ba5d50a5dd4"}}, &(0x7f00000000c0)=""/39, 0x39, 0x27, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x10, &(0x7f00000003c0)={&(0x7f0000000240)=""/38, 0x26, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x10, &(0x7f0000000580)={&(0x7f0000000440)=""/223, 0xdf}}, 0x10) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f6e65742f74756eff", 0x241, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r1, 0x3b7) socket$kcm(0x2, 0x40000000, 0x2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xffffffba) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0xc0189436, 0x0) close(r1) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000040)=r0) 11:29:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x34, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:33 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:33 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x60000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:33 executing program 5: r0 = socket$kcm(0x11, 0x1000000002, 0x0) socket$kcm(0x29, 0x4, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xc, &(0x7f0000000080)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x28}, @jmp={0x5, 0x3, 0xd, 0xa, 0x2, 0xfffffffffffffffc, 0xfffffffffffffffc}, @exit, @ldst={0x3, 0x2, 0x7, 0x9, 0x3, 0xfffffffffffffff5, 0x10}, @alu={0x7, 0x3, 0xf, 0x7, 0x3, 0xffffffffffffffff, 0xfffffffffffffffc}, @exit, @ldst={0x3, 0x3, 0x2, 0x1, 0x0, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x19}], &(0x7f00000000c0)='GPL\x00', 0x2, 0xd3, &(0x7f0000000100)=""/211, 0x41100, 0x1, [], 0x0, 0xf}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000280)={r0, r1}) 11:29:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f800", 0x1132}) 11:29:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x2, 0x88fb, &(0x7f0000000380)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socketpair$packet(0x11, 0x10000000000, 0x300, &(0x7f0000001600)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='cpuset\x00') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r3, 0x0, 0x5, &(0x7f0000000040)='syz1\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000580)={0x4, 0x70, 0x8000, 0x81, 0x0, 0x0, 0x0, 0x1, 0x1808, 0x1, 0x1000, 0x3, 0x9, 0x1, 0xb2, 0xfe09, 0xd09, 0x401, 0x80000000, 0x10000, 0xffffffffffffc7b6, 0x8, 0xe0c, 0x3, 0x1000, 0x5, 0xfffffffffffff927, 0xd2, 0x6, 0xffffffff, 0x2, 0x7fffffff, 0x2, 0x4, 0xfff, 0x4, 0x6, 0x6, 0x0, 0x10001, 0x4, @perf_config_ext={0x5, 0x8}, 0x20, 0x1, 0x4, 0x0, 0x400000000, 0x8000, 0x58}, r4, 0x3, r0, 0x8) socket$kcm(0x29, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r2, &(0x7f00000003c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x16fd) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)) socketpair(0x0, 0x0, 0x400, &(0x7f0000000540)) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000400)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000080)='mime_type.em1\x00'}, 0x30) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0x9) openat$cgroup_ro(r6, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) gettid() 11:29:33 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) gettid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x272, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x9, 0x20, 0x80, 0x8, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x100000001}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg$kcm(r2, &(0x7f00000004c0)={&(0x7f0000000340)=@un=@abs={0x0, 0x0, 0x4e24}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000280)}, {&(0x7f00000003c0)="0f13c3bd5b8e72d4d96815d3408483a5dc82f5ef29fcdc570f11ab65fe6a6d3129eaeddda4d82abfa01bdcf376eedd24a87bf70336e476ffeb6e700d945576a4782bd29ac626d1e0492bc63bb4755b00fc534f51d5a47a750d02a34992ed96c4a88ebec1ba7a33cc7a9847d77f96c9a4434fcd134b9e1aee7973ce34032089da3ce289b2e249a1ed484b3e14e330517c40c9d4dbeaaf96a134fcaaf7a8ed4b26416face6a921b5e3ae773e0ecef18de8aa8a5f022f43d5e7dc", 0xb9}], 0x2, 0x0, 0x0, 0x5}, 0x20000000) socketpair(0x17, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000080), &(0x7f0000000400)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000300)='0\x00') socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f00000002c0)) 11:29:33 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001a00", 0x1132}) 11:29:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:33 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:34 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x608]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:34 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f200", 0x1132}) 11:29:34 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x1d, 0x806, 0x6, &(0x7f0000000000)) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x33c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 254.773079] can: request_module (can-proto-6) failed. [ 254.821515] can: request_module (can-proto-6) failed. 11:29:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:35 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xffffffffa0010000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:35 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000fe00", 0x1132}) 11:29:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x2, 0x88fb, &(0x7f0000000380)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socketpair$packet(0x11, 0x10000000000, 0x300, &(0x7f0000001600)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='cpuset\x00') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r3, 0x0, 0x5, &(0x7f0000000040)='syz1\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000580)={0x4, 0x70, 0x8000, 0x81, 0x0, 0x0, 0x0, 0x1, 0x1808, 0x1, 0x1000, 0x3, 0x9, 0x1, 0xb2, 0xfe09, 0xd09, 0x401, 0x80000000, 0x10000, 0xffffffffffffc7b6, 0x8, 0xe0c, 0x3, 0x1000, 0x5, 0xfffffffffffff927, 0xd2, 0x6, 0xffffffff, 0x2, 0x7fffffff, 0x2, 0x4, 0xfff, 0x4, 0x6, 0x6, 0x0, 0x10001, 0x4, @perf_config_ext={0x5, 0x8}, 0x20, 0x1, 0x4, 0x0, 0x400000000, 0x8000, 0x58}, r4, 0x3, r0, 0x8) socket$kcm(0x29, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r2, &(0x7f00000003c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x16fd) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)) socketpair(0x0, 0x0, 0x400, &(0x7f0000000540)) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000400)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000080)='mime_type.em1\x00'}, 0x30) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0x9) openat$cgroup_ro(r6, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) gettid() 11:29:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000e80)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000240)=""/251}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)='tunl0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000080)='tunl0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 11:29:35 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xffffdd86]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc78c4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001200", 0x1132}) 11:29:35 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x2, 0x88fb, &(0x7f0000000380)={0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='cpuset\x00') socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x113ef0a8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000000040)=[{&(0x7f0000000600)=""/82, 0x52}], 0x1, &(0x7f0000000440)=""/12, 0xc, 0x8000}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'veth1_to_team\x00', 0x4020}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)=ANY=[]) openat$cgroup_ro(r1, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x16fd) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)={0x0, 0x2, [@random="b095ea302acf", @remote]}) socketpair(0x0, 0x0, 0x400, &(0x7f0000000540)) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000008c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r3, &(0x7f0000000340)='threaded\x00', 0x9) recvmsg$kcm(r4, &(0x7f0000000880)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)=""/11, 0xb}, {&(0x7f0000000680)=""/248, 0xf8}, {&(0x7f0000000780)=""/227, 0xe3}], 0x3, &(0x7f0000000300)=""/28, 0x1c, 0x80000000}, 0x1) gettid() 11:29:35 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x25, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001e00", 0x1132}) 11:29:35 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x543]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:35 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x2, 0x88fb, &(0x7f0000000380)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socketpair$packet(0x11, 0x10000000000, 0x300, &(0x7f0000001600)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='cpuset\x00') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r3, 0x0, 0x5, &(0x7f0000000040)='syz1\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000580)={0x4, 0x70, 0x8000, 0x81, 0x0, 0x0, 0x0, 0x1, 0x1808, 0x1, 0x1000, 0x3, 0x9, 0x1, 0xb2, 0xfe09, 0xd09, 0x401, 0x80000000, 0x10000, 0xffffffffffffc7b6, 0x8, 0xe0c, 0x3, 0x1000, 0x5, 0xfffffffffffff927, 0xd2, 0x6, 0xffffffff, 0x2, 0x7fffffff, 0x2, 0x4, 0xfff, 0x4, 0x6, 0x6, 0x0, 0x10001, 0x4, @perf_config_ext={0x5, 0x8}, 0x20, 0x1, 0x4, 0x0, 0x400000000, 0x8000, 0x58}, r4, 0x3, r0, 0x8) socket$kcm(0x29, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r2, &(0x7f00000003c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x16fd) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)) socketpair(0x0, 0x0, 0x400, &(0x7f0000000540)) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000400)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000080)='mime_type.em1\x00'}, 0x30) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0x9) openat$cgroup_ro(r6, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) gettid() 11:29:35 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000eb00", 0x1132}) 11:29:35 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000037, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:35 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xffffffffa0008000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 256.326871] protocol 0800 is buggy, dev ip6_vti0 [ 256.344874] protocol 0800 is buggy, dev ip6_vti0 11:29:36 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(0xffffffffffffffff) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:36 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x88caffff00000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x2, 0x88fb, &(0x7f0000000380)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) socketpair$packet(0x11, 0x10000000000, 0x300, &(0x7f0000001600)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='cpuset\x00') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r3, 0x0, 0x5, &(0x7f0000000040)='syz1\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000580)={0x4, 0x70, 0x8000, 0x81, 0x0, 0x0, 0x0, 0x1, 0x1808, 0x1, 0x1000, 0x3, 0x9, 0x1, 0xb2, 0xfe09, 0xd09, 0x401, 0x80000000, 0x10000, 0xffffffffffffc7b6, 0x8, 0xe0c, 0x3, 0x1000, 0x5, 0xfffffffffffff927, 0xd2, 0x6, 0xffffffff, 0x2, 0x7fffffff, 0x2, 0x4, 0xfff, 0x4, 0x6, 0x6, 0x0, 0x10001, 0x4, @perf_config_ext={0x5, 0x8}, 0x20, 0x1, 0x4, 0x0, 0x400000000, 0x8000, 0x58}, r4, 0x3, r0, 0x8) socket$kcm(0x29, 0x2, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r2, &(0x7f00000003c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000300)=ANY=[]) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x16fd) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)) socketpair(0x0, 0x0, 0x400, &(0x7f0000000540)) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000400)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000080)='mime_type.em1\x00'}, 0x30) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r1, &(0x7f0000000340)='threaded\x00', 0x9) openat$cgroup_ro(r6, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) gettid() 11:29:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00e\x00', 0x1132}) 11:29:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000069, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:36 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8953, &(0x7f0000000040)=0x2) 11:29:36 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x1a0ffffffff]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00g\x00', 0x1132}) 11:29:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000009, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:36 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)) 11:29:36 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x8953, &(0x7f0000000040)=0x2) [ 256.853292] protocol 0800 is buggy, dev ip6_vti0 [ 256.877729] protocol 0800 is buggy, dev ip6_vti0 11:29:36 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa8050000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000007, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009500", 0x1132}) [ 257.094796] protocol 0800 is buggy, dev ip6_vti0 11:29:37 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)) 11:29:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000c40)={&(0x7f0000000480)=@pppoe={0x18, 0x0, {0x0, @link_local, 'bond0\x00'}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="b4e3473d035ef170e1f39f6030fba7d7da56a3ca13cf7b35dec3e09cd43f9e99adbf38c1d47c29e7ee1ac4ed3d9dc609b7093b8580e3c1e4c6d3a214b2aa19d4fc6a86a4fda6129d55192444613399d8e04f797e69008a5fbc93dfbaa797e74bf3207ec871a01a30fe09ab32033b9d1c744bbb", 0x73}], 0x1, &(0x7f0000000780), 0x0, 0x804}, 0x4000000) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x29, 0x400000000005, 0x0) close(r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x894c, &(0x7f0000000280)={r2}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, r1, 0x0, 0x15, &(0x7f0000000500)='\\cgroup-/\'GPLwlan0{}\x00'}, 0x30) socketpair(0x15, 0x1, 0xd0b9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r3, 0x50, &(0x7f0000000200)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0x50, &(0x7f0000000700)}, 0x10) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40286608, 0x20000001) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r7, &(0x7f0000000000)="e9", &(0x7f0000000100)=""/155}, 0x18) socketpair(0xf, 0x6, 0x79, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000300)={r9}) ioctl$TUNSETTXFILTER(r8, 0x400454d1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]) openat$cgroup_subtree(r9, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 11:29:37 executing program 0 (fault-call:21 fault-nth:0): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000005, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009200", 0x1132}) 11:29:37 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xffffca88]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 257.500979] protocol 0800 is buggy, dev ip6_vti0 [ 257.515013] protocol 0800 is buggy, dev ip6_vti0 [ 257.519903] protocol 0800 is buggy, dev ip6_vti0 [ 257.557604] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 14 (only 16 groups) [ 257.567757] protocol 0800 is buggy, dev ip6_vti0 [ 257.572615] protocol 0800 is buggy, dev ip6_vti0 [ 257.589073] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 14 (only 16 groups) [ 257.601790] FAULT_INJECTION: forcing a failure. [ 257.601790] name failslab, interval 1, probability 0, space 0, times 0 [ 257.621318] CPU: 1 PID: 18668 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #128 [ 257.628696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.638055] Call Trace: [ 257.640664] dump_stack+0x1c4/0x2b4 [ 257.644310] ? dump_stack_print_info.cold.2+0x52/0x52 [ 257.649530] should_fail.cold.4+0xa/0x17 [ 257.653616] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.658733] ? print_usage_bug+0xc0/0xc0 [ 257.662823] ? __lock_acquire+0x7ec/0x4ec0 [ 257.667085] ? print_usage_bug+0xc0/0xc0 [ 257.671164] ? mark_held_locks+0x130/0x130 [ 257.675417] ? mark_held_locks+0x130/0x130 [ 257.679670] ? __lock_acquire+0x7ec/0x4ec0 [ 257.683916] ? graph_lock+0x170/0x170 [ 257.687724] ? find_held_lock+0x36/0x1c0 [ 257.691803] __should_failslab+0x124/0x180 [ 257.696057] should_failslab+0x9/0x14 [ 257.699883] kmem_cache_alloc+0x47/0x730 [ 257.703956] ? mark_held_locks+0x130/0x130 [ 257.708209] dst_alloc+0xbb/0x1d0 [ 257.711680] rt_dst_alloc+0x105/0x540 [ 257.715492] ? fnhe_flush_routes+0x480/0x480 [ 257.719912] ? __lock_is_held+0xb5/0x140 [ 257.723997] ip_route_output_key_hash_rcu+0xa57/0x3490 [ 257.729295] ? ip_route_input_noref+0x260/0x260 [ 257.733986] ? __mutex_lock+0x85e/0x1700 [ 257.738068] ? lock_acquire+0x1ed/0x520 [ 257.742104] ? ip_route_output_key_hash+0x1ab/0x3b0 [ 257.747133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.752697] ? check_preemption_disabled+0x48/0x200 [ 257.757733] ? kasan_check_read+0x11/0x20 [ 257.761891] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 257.767179] ? rcu_bh_qs+0xc0/0xc0 [ 257.770732] ? __lock_acquire+0x7ec/0x4ec0 [ 257.774973] ? graph_lock+0x170/0x170 [ 257.778790] ip_route_output_key_hash+0x240/0x3b0 [ 257.783642] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 257.789190] ? find_held_lock+0x36/0x1c0 [ 257.793265] ip_route_output_flow+0x28/0xc0 [ 257.797629] arp_req_delete+0x3ab/0x6b0 [ 257.801635] ? arp_req_set_proxy.isra.21.part.22+0x1f0/0x1f0 [ 257.807442] ? apparmor_cred_transfer+0x590/0x590 [ 257.812300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 257.817886] arp_ioctl+0x468/0xae0 [ 257.821439] ? __lock_acquire+0x7ec/0x4ec0 [ 257.825688] ? arp_constructor+0xd80/0xd80 [ 257.829932] ? graph_lock+0x170/0x170 [ 257.833746] ? graph_lock+0x170/0x170 [ 257.837568] ? __lock_acquire+0x7ec/0x4ec0 [ 257.841827] inet_ioctl+0x237/0x360 [ 257.845476] ? _parse_integer+0x134/0x180 [ 257.849635] ? inet_stream_connect+0xa0/0xa0 [ 257.854054] ? graph_lock+0x170/0x170 [ 257.857868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 257.863417] ? graph_lock+0x170/0x170 [ 257.867225] ? _parse_integer+0x180/0x180 [ 257.871385] ? graph_lock+0x170/0x170 [ 257.875194] ? lock_release+0x970/0x970 [ 257.879175] ? arch_local_save_flags+0x40/0x40 [ 257.883809] ? find_held_lock+0x36/0x1c0 [ 257.887948] sock_do_ioctl+0xeb/0x420 [ 257.891769] ? ___sys_recvmsg+0x680/0x680 [ 257.895933] ? check_preemption_disabled+0x48/0x200 [ 257.900968] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 257.906791] ? kasan_check_read+0x11/0x20 [ 257.910952] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 257.916242] ? rcu_bh_qs+0xc0/0xc0 [ 257.919805] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 257.925037] sock_ioctl+0x313/0x690 [ 257.928674] ? routing_ioctl+0x890/0x890 [ 257.932745] ? ksys_dup3+0x680/0x680 [ 257.936468] ? find_held_lock+0x36/0x1c0 [ 257.940549] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 257.945496] ? routing_ioctl+0x890/0x890 [ 257.949602] do_vfs_ioctl+0x1de/0x1720 [ 257.953501] ? __lock_is_held+0xb5/0x140 [ 257.957575] ? ioctl_preallocate+0x300/0x300 [ 257.962003] ? __fget_light+0x2e9/0x430 [ 257.965989] ? fget_raw+0x20/0x20 [ 257.969454] ? __sb_end_write+0xd9/0x110 [ 257.973531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 257.979072] ? fput+0x130/0x1a0 [ 257.982363] ? do_syscall_64+0x9a/0x820 [ 257.986348] ? do_syscall_64+0x9a/0x820 [ 257.990338] ? lockdep_hardirqs_on+0x421/0x5c0 [ 257.995419] ? security_file_ioctl+0x94/0xc0 [ 257.999851] ksys_ioctl+0xa9/0xd0 [ 258.003322] __x64_sys_ioctl+0x73/0xb0 [ 258.007222] do_syscall_64+0x1b9/0x820 [ 258.011221] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.016607] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.021547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.026405] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.031434] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.036466] ? prepare_exit_to_usermode+0x291/0x3b0 [ 258.041500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.046365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.051565] RIP: 0033:0x457569 [ 258.054777] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.073685] RSP: 002b:00007f95ff838c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.081404] RAX: ffffffffffffffda RBX: 00007f95ff838c90 RCX: 0000000000457569 [ 258.088678] RDX: 0000000020000040 RSI: 0000000000008953 RDI: 0000000000000004 [ 258.095957] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 11:29:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000034, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:37 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009a00", 0x1132}) 11:29:37 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x8, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x0, 0x6, 0xf, 0x0, 0xfffffffffffffff8, 0x10}, @alu={0x7, 0x864, 0x0, 0xe, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100}, @alu={0x4, 0x2df, 0xf, 0x0, 0x8, 0xfffffffffffffffe}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xd}, 0x48) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000180)=r2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffef2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000280)="02ed56e612a086425bfaf45ff23412bb7753cf70aa069593facb07082f6514f01359255091a5c659917d9c467eaaf6b9845bc0fa0dc8d60c0b14822052fa1ca38a1d5d91a9f2c2eed275"}, 0x10) [ 258.103229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95ff8396d4 [ 258.110504] R13: 00000000004c05b8 R14: 00000000004d07b0 R15: 0000000000000007 11:29:37 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x5ac]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:37 executing program 0 (fault-call:21 fault-nth:1): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:38 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="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", 0x1000}, {&(0x7f0000000000)="5368924358d7fc69bc976fd2be5031aaf8d5abd4927baa759b35a263e583", 0x1e}], 0x3, &(0x7f00000024c0)=[{0x1010, 0x105, 0x5, "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"}, {0x30, 0x10c, 0x5, "7cfe6ea759c3506567983fa83c81a0f0415f4e54240ab276e9fb07"}, {0x80, 0x10a, 0x5000000000000, "8467c1a5562febbb7c4850c42579a48a7da33f4e0b699d54796fdef0e354cee25627a8cdd3ab7f152baba3630c35a14121c748fde5c16100bf0fe8b64a45f0e005a149cd07dd29e432321cbe98ffc6c3b64995b43ffccdee72015c0d4634178adaa0f2424402353a510e7b"}, {0x60, 0x109, 0x9, "5c9ecf1a3860671ded552bbe85ce0d31daeb56eb75b5f5f6df8f7ea52c7b6d2f3ed725f797574e5bc01896ceb87b20f8f182775413bc21c9e754cf1b18fd425563be1a9fd8428f4d1c"}, {0xe0, 0x0, 0xf1, "ed13b2a0b7b1d74d1ae738e9a2f6fc3d1f77247e1fee92dc0ae051c89114068f27be04995d44beac1951ae177f7f144aaf792e0a8987eb9d7dfe7daf6db9a0140f1a9a37ac58b0ac5ab4312f3a098eedc355d7a8ec8af5fe79f7cc3bc27f44710a550b280c4d6d81a37102b0d86b25627241eda3638aa49d3baaf24c7c618624af633b006805b46ccfbed20d2da60326c1207f9d5ae37bbea0ee70d7073c7e341ffb174f6b2305f04cf4d5d35a5cd2fe32eb8d64ee8473e26c77434a681f9bc03a670a0beadac3db461dbf9f"}, {0xe8, 0x118, 0x10000, "83e794f95c7a454a9f8539d2efcb7b0cdcd5c114b3fdb3a046174725813cfc77ae44140d1b6bfbc3c524536889075d14973bfe7066593744f30949c2a16048611debf61d97b647eab9b7ac42bf09d0e7511f8517caad1cdd2dfc8426f17e8216657796db25864ad22bb22658f07f9d99812703d94fefaf524666e86fd8c1f85b5a050bf5c927ffc08e4b734f8014287be714cdb9f9c68f19d78d865479d06510bee60b09415815edc652b4a03bf78795561424a6fa4df0ce70b548e1ffb05f7138d49164283c1862806e12e4a417ff6ef861df3d7b40a590"}, {0x108, 0x84, 0x10000, "c2a87fda72feaad64e999a8fc594aab575290bc9205acf221d5550dabbc97c8feac67d6bb2ea8c9333516c26d98ecd7c4838584734bda1e1471923e305e67cc80358b633edf15592d06ace3a8bc97a1c5d6aba3a15fb268b7056df331c9a6549304b51b022baa9ff3fa231dfed8e9959265c6fdb3f8211050802d8a09ea0cd3f7d094d2471f1e91d4e0d454e9e2e62b9eb3ee4a0e9aa6e417375b364c20c40b8f80363807c40591989268a994575413df497bf243de00570f26f6ea70485c766954a0ecc1f40969120b1be8e12290f952289c16d5f9c3f81be2ac3e324125491d414b3ee04de8a507f8e58610ccced06c09e31cb06"}, {0xf8, 0x114, 0x1, "ef2e1afffb84179a4dae26f84811bbaacd1aa59a14a43ce53f987ab1233f2d003f9c02f18b92eecfbe0a22865b05468b874e9d186d8191740b0b308d35e7e47a7d3e535074d67c53b8b830b33d28d352db519b5eb5883220dce2f7bfee411df841be66c68955fa4f6231975a30a30e63b725e9721a0909992f626c9fb80962d42292b5a0a1b97bc4bbe3f4d47ee47c7361e1f27bbced6b88380f9f8b0abdfce34270d5563aa7660dfdd6cb7bd3c7fbfe0ab01e523aa873858a1cbbea6febb6316c5fd5aadeaaddf48d4830fb3f56f8230adf304367ebf91cc5bc839f34d4f489c0ebbba8d39398"}, {0x40, 0x0, 0x1000, "e1c3c306346bc7f9284186b3bb11d7e2cfe89df259529a26c7cff8aaf312b4a928e18f155ca421a228f75e59cfa2"}], 0x1528, 0x44000}, 0x4000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000300)="2c0000001d0081aee4050cecff0e00fa078b5b00000000000000000befccd77f3e9cf0758ef9000000b0eba0", 0x2c}], 0x1, &(0x7f0000000040)}, 0x0) 11:29:38 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x689]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x37, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:38 executing program 5: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x9d, 0x80000201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r3, &(0x7f00000000c0), 0xffffff19) recvmsg$kcm(r3, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000780)=""/50, 0x32}, {&(0x7f00000007c0)=""/223, 0xdf}, {&(0x7f0000000a40)=""/245, 0xf5}, {&(0x7f0000000b40)=""/35, 0x23}, {&(0x7f0000000b80)=""/140, 0x8c}], 0x5, &(0x7f0000000cc0)=""/42, 0x2a, 0x2}, 0x0) sendmsg(r1, &(0x7f0000000340)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x2, 0x1, 0x3, {0xa, 0x4e21, 0x2c1, @mcast1, 0x7}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000140)="2ccc8ae989ac", 0x6}, {&(0x7f0000000280)="7d13ca32db48129556bcea516675a1456730c7dd01e97fa61abaa96c816f6fb16934c1efcd94fb88576f057998a661727baeea9ee01e0cc031937ed2b4e8926fd5b074c015d03ca04d3094c1bd4a0d276e7b8a56e65d81a43dc0cbc4243b", 0x5e}, {&(0x7f0000000400)="50176ff34c610d0d02f89a2157338b0e11bb0d3f385f723242e65df6b05cd904cb4b440d65cc5e8254ab9c137b659e34efca61b8c7095e822f3cafcee8be2df72cd1046a8d295a8cb27b972ece9bc5a2d770ed4862d988b30dd8277d029231d67afdbf38fdd46cb3facd8509b33f33520e9ea257848d935057ad06e0ff2f305df5c994f018eb4ec7e49955b9951917643c47b36d35dd8b2efae573f1c14a0fb0d1675bacdaa30ad29cfdbbc9b852d808b6bcaea4", 0xb4}, {&(0x7f00000004c0)="8b97c4f28cbb46d244f3c152d47fbd0635342c89fc8cacd65d650e4e63f3a5248ce43c8f33c3bbc2ca9389b529e5f2e80103edc913ef3347920e91d76733df1110f0693dad56a091c3a21234d91cfd7168b1e31b8e33c2bf0e2d4becd3b8f95a415297fc0445f7ee86595495ef0c627663f7a4ad3edddb2e9adc21e2b62d2dc44a009a9a95a1b377e79fdb06f32e319dca1f8f909b2b00aa38a043a05ae90a0136abbac916a300cea3cf", 0xaa}, {&(0x7f0000000300)="4a4f2f6ec6ad5f6ad9fc8791c8af107baf51a4dd5d016219047e473b8273b3926adeb3e4e1fd7460727ccc77dba0bf4d7474ab48d5ad70", 0x37}, {&(0x7f0000000580)="9c38b7376457f8533b1dd7eda861c43745145efbd4adad11695a9eef1d6fdb24b0e358d496c84adf9949ec5d174d453a3285bb1773f044c132c84ec3e736d0496cecc5fe0773f126045511586a207743c4158085ee693011bf73ea8c9965cd4db15a5d416d1f79c835cdfb41d0b34e9b07c28a7f131d59c3172b111d658afde42cf4cf1c1881ce4151ca46cb2fa265b8729c71f734b3fccd940ae1c95996d14cb1df0f9c36b2f2cd7af4", 0xaa}, {&(0x7f0000000640)="e5a2c921f371f6c16374d26f5e96e4b3cc1197b4fb4f0f37ecbbf717032e45db21492e0fdf5fdcb3a897bc82725524a40fc7b20153dc0dbc75480dd4f889fa14de7ea3b33606e42c7a9bc961e22191cc5d1ea074f848e00a", 0x58}], 0x7, &(0x7f0000000d40)=ANY=[@ANYBLOB="6000000000000000100100000800000073a8a47fc630810748f6ff6aaaf4f60e00000000d1821ac4642724f9d0af0e77be82fa2b1b56dd2ff0f7f33e167d7697284e4f088cdc92881662a37d7d4fe8aea834786b3d517c55ff3b844a2c000000f80000000000000001000000400000005b70a55652b7a65667160ce55a8a2453cd92edce8bf921e0fa83dd5492db60f94c589b1af236d44192021e800b27f2cd3506d5fef35e28820626262119a6e5ce97f7aadd48c918dfc071e603699204dd6b5e1d45cfe53bad2ed02142b272e6e2463ce2efe61638699a2b49211838b46833f4ccaf9b52925089e0d97695824b8d153276c00a0e1f7916036381ebf54cdd74bfc3e9a30d58d493238fb692f68a53120cd75aac39948071b12df75dc9d9143ce93af4577806ab198d827e3fcc2e1ce719dcca165ff0cdf5556a43a77b87d76f2199e32327f722658a3ee44ff64af932358d96f909c211ee6c000000000000000000000000000075fe5ebeb13038e07e35caceafda8bd5256068a8c88d9e1801"], 0x158, 0x40000d0}, 0x4000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.swap.current\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000740)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) socketpair$inet6(0xa, 0x0, 0xfffffffffffffbff, &(0x7f00000000c0)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) [ 258.381738] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. [ 258.466282] FAULT_INJECTION: forcing a failure. [ 258.466282] name failslab, interval 1, probability 0, space 0, times 0 [ 258.477814] CPU: 1 PID: 18696 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #128 [ 258.485202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.494566] Call Trace: [ 258.497175] dump_stack+0x1c4/0x2b4 [ 258.500814] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.506036] should_fail.cold.4+0xa/0x17 [ 258.510112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.515229] ? __lock_acquire+0x7ec/0x4ec0 [ 258.519468] ? lockdep_hardirqs_on+0x421/0x5c0 [ 258.524052] ? print_usage_bug+0xc0/0xc0 [ 258.528114] ? trace_hardirqs_on+0xbd/0x310 [ 258.532448] ? print_usage_bug+0xc0/0xc0 [ 258.536523] ? mark_held_locks+0x130/0x130 [ 258.540768] ? find_held_lock+0x36/0x1c0 [ 258.544847] ? __lock_acquire+0x7ec/0x4ec0 [ 258.549088] ? mark_held_locks+0xc7/0x130 [ 258.553244] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 258.558367] ? mark_held_locks+0x130/0x130 [ 258.562615] __should_failslab+0x124/0x180 [ 258.566868] should_failslab+0x9/0x14 [ 258.570674] kmem_cache_alloc_node+0x56/0x730 [ 258.575172] ? graph_lock+0x170/0x170 [ 258.578977] ? trace_hardirqs_on+0xbd/0x310 [ 258.583301] ? kasan_check_read+0x11/0x20 [ 258.587462] __alloc_skb+0x119/0x770 [ 258.591186] ? skb_scrub_packet+0x490/0x490 [ 258.595509] ? find_held_lock+0x36/0x1c0 [ 258.599583] ? neigh_del+0x30e/0x420 [ 258.603309] ? lock_downgrade+0x900/0x900 [ 258.607463] ? lockdep_hardirqs_on+0x421/0x5c0 [ 258.612054] ? lock_release+0x970/0x970 [ 258.616033] ? neigh_lookup+0x586/0x7c0 [ 258.620014] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 258.625478] __neigh_notify+0x8c/0x160 [ 258.629377] neigh_cleanup_and_release+0x7b/0xe0 [ 258.634142] neigh_del+0x31c/0x420 [ 258.637695] ? neigh_cleanup_and_release+0xe0/0xe0 [ 258.642634] ? __lock_is_held+0xb5/0x140 [ 258.646712] neigh_remove_one+0x20d/0x2d0 [ 258.650877] arp_req_delete+0x200/0x6b0 [ 258.654872] ? arp_req_set_proxy.isra.21.part.22+0x1f0/0x1f0 [ 258.660675] ? apparmor_cred_transfer+0x590/0x590 [ 258.665528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.671097] arp_ioctl+0x468/0xae0 [ 258.674646] ? __lock_acquire+0x7ec/0x4ec0 [ 258.678891] ? arp_constructor+0xd80/0xd80 [ 258.683150] ? graph_lock+0x170/0x170 [ 258.686957] ? graph_lock+0x170/0x170 [ 258.690772] ? __lock_acquire+0x7ec/0x4ec0 [ 258.695015] inet_ioctl+0x237/0x360 [ 258.698644] ? _parse_integer+0x134/0x180 [ 258.702798] ? inet_stream_connect+0xa0/0xa0 [ 258.707212] ? graph_lock+0x170/0x170 [ 258.711017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.716562] ? graph_lock+0x170/0x170 [ 258.720379] ? _parse_integer+0x180/0x180 [ 258.724527] ? graph_lock+0x170/0x170 [ 258.728330] ? lock_release+0x970/0x970 [ 258.732309] ? arch_local_save_flags+0x40/0x40 [ 258.736911] ? find_held_lock+0x36/0x1c0 [ 258.740984] sock_do_ioctl+0xeb/0x420 [ 258.744796] ? ___sys_recvmsg+0x680/0x680 [ 258.748952] ? check_preemption_disabled+0x48/0x200 [ 258.753985] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 258.759786] ? kasan_check_read+0x11/0x20 [ 258.763943] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 258.769227] ? rcu_bh_qs+0xc0/0xc0 [ 258.772782] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 258.777978] sock_ioctl+0x313/0x690 [ 258.781620] ? routing_ioctl+0x890/0x890 [ 258.785688] ? ksys_dup3+0x680/0x680 [ 258.789404] ? find_held_lock+0x36/0x1c0 [ 258.793475] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 258.798414] ? routing_ioctl+0x890/0x890 [ 258.802485] do_vfs_ioctl+0x1de/0x1720 [ 258.806378] ? __lock_is_held+0xb5/0x140 [ 258.810446] ? ioctl_preallocate+0x300/0x300 [ 258.814867] ? __fget_light+0x2e9/0x430 [ 258.818859] ? fget_raw+0x20/0x20 [ 258.822320] ? __sb_end_write+0xd9/0x110 [ 258.826393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 258.831937] ? fput+0x130/0x1a0 [ 258.835226] ? do_syscall_64+0x9a/0x820 [ 258.839208] ? do_syscall_64+0x9a/0x820 [ 258.843186] ? lockdep_hardirqs_on+0x421/0x5c0 [ 258.847780] ? security_file_ioctl+0x94/0xc0 [ 258.852196] ksys_ioctl+0xa9/0xd0 [ 258.855659] __x64_sys_ioctl+0x73/0xb0 [ 258.859559] do_syscall_64+0x1b9/0x820 [ 258.863591] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 258.868971] ? syscall_return_slowpath+0x5e0/0x5e0 [ 258.873904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.878756] ? trace_hardirqs_on_caller+0x310/0x310 [ 258.883777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 258.888803] ? prepare_exit_to_usermode+0x291/0x3b0 [ 258.893848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.898707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.903899] RIP: 0033:0x457569 [ 258.907101] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.926102] RSP: 002b:00007f95ff838c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.933856] RAX: ffffffffffffffda RBX: 00007f95ff838c90 RCX: 0000000000457569 [ 258.941125] RDX: 0000000020000040 RSI: 0000000000008953 RDI: 0000000000000004 [ 258.948394] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 258.955663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95ff8396d4 11:29:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000003d00)) r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0xf00, @dev, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYRES32], 0x4, 0x3}, 0x20008844) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) 11:29:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x69, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 258.962936] R13: 00000000004c05b8 R14: 00000000004d07b0 R15: 0000000000000007 11:29:38 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00y\x00', 0x1132}) 11:29:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:38 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000630000006a0adefe00000000850000000b000000b7000000000000219500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x2e, 0x88, &(0x7f0000000040)="3189f945959625bf22d97d08a39a43200bd46f85c140c942bc49007f8a70fcbe2caaaeef6161473afc6fb16de6ca", &(0x7f0000000480)=""/136, 0x575}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xa1, 0xdf, &(0x7f0000000280)="23f632cb30098d5d8308ad4f1c32751f88ebd008214fb8108ebde2fdb14e4a957b1e6b47636a0d61b7e7a2a993b4e93d62a909c860d04d00cfae519263ca51d34b9c6a2c05ec18e189291669fe7666d9cbf6f3fb23b3833683c28226f634ff8a042e7a82ce5cc0d13deef592cbefed0a73994fa7395b5c5eaef14bf901fd9801d650a8d0b4803feb533d8881d3036e5e4c1d94438ab6b80214896bd303f72068e8", &(0x7f0000000540)=""/223, 0x1}, 0x28) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000035c0)={&(0x7f00000023c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003540)=[{&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000003440)=""/230, 0xe6}], 0x2, &(0x7f0000003580)=""/27, 0x1b, 0x4}, 0x40) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x10, &(0x7f00000006c0)={&(0x7f0000000640)=""/113, 0x71, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000003600)={0x8, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000005000000000000005f000000ad0000f2ff0000000000000000000000dd70ffffffffffff0000000000000000850000001a00000000000000002260c9a353374b40ffffff000000000000000038330000f0ffffff0000000000000000180000000900000000683dd3b30000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x1, 0xdc, &(0x7f0000000380)=""/220, 0x41100, 0x0, [], r1, 0xb}, 0x48) 11:29:38 executing program 0 (fault-call:21 fault-nth:2): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:38 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x89060000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:38 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00*\x00', 0x1132}) 11:29:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe80, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xa, 0x20001, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000002880)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002900)=""/78, 0x4e}], 0x1, 0x0, 0x0, 0x9}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000002a00)={0x1f, 0x2, &(0x7f0000000140)=@raw=[@exit], &(0x7f0000000180)='GPL\x00', 0x7fff, 0xcc, &(0x7f00000001c0)=""/204, 0x41f00, 0x1, [], r1, 0xb}, 0x48) r2 = perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x8000, 0x7, 0x0, 0x0, 0x0, 0x7, 0xc1008, 0x4, 0x5, 0xe8, 0x10000, 0x9, 0x8, 0xfffffffffffffffe, 0x8001, 0x5, 0xffffffff, 0xffffffff, 0x1, 0x100000000, 0x79e, 0x2, 0x83, 0x0, 0x1, 0x873, 0x2, 0x4f6, 0x1ff, 0xe000000000000, 0x5, 0x9, 0xfffffffffffffffa, 0xffffffffffffff26, 0x8, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x81, 0xff}, 0x20, 0x8, 0xde21, 0x7, 0x5f2, 0x8001, 0x9683}, 0x0, 0xe, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x400) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x113, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffff0001}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) 11:29:39 executing program 5: socket$kcm(0x29, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000014c0)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x4}, 0x48) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) socket$kcm(0x11, 0x2, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000000f, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x41, 0xea, &(0x7f0000000040)="f16dda47d1af2c041b68ce3953fdf2321c46a9cc8e1a6399d423fb8b0df38c18ee868f6e63d530f8edbd30c364368b1c98f06e8837de0e1d35577238260220bf0a", &(0x7f0000000400)=""/234, 0x5}, 0x28) [ 259.434670] FAULT_INJECTION: forcing a failure. [ 259.434670] name failslab, interval 1, probability 0, space 0, times 0 [ 259.445960] CPU: 0 PID: 18760 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #128 [ 259.453326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.462685] Call Trace: [ 259.465303] dump_stack+0x1c4/0x2b4 [ 259.468958] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.474182] should_fail.cold.4+0xa/0x17 [ 259.478267] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.483385] ? __save_stack_trace+0x8d/0xf0 [ 259.487738] ? save_stack+0xa9/0xd0 [ 259.491373] ? save_stack+0x43/0xd0 [ 259.495007] ? kasan_kmalloc+0xc7/0xe0 [ 259.498905] ? kasan_slab_alloc+0x12/0x20 [ 259.503059] ? kmem_cache_alloc_node+0x144/0x730 [ 259.507827] ? __alloc_skb+0x119/0x770 [ 259.511733] ? __neigh_notify+0x8c/0x160 [ 259.515802] ? neigh_cleanup_and_release+0x7b/0xe0 [ 259.520744] ? neigh_del+0x31c/0x420 [ 259.524470] ? neigh_remove_one+0x20d/0x2d0 [ 259.528799] ? arp_req_delete+0x200/0x6b0 [ 259.532958] ? arp_ioctl+0x468/0xae0 [ 259.536674] ? inet_ioctl+0x237/0x360 [ 259.540498] ? sock_do_ioctl+0xeb/0x420 [ 259.544475] ? sock_ioctl+0x313/0x690 [ 259.548284] ? do_vfs_ioctl+0x1de/0x1720 [ 259.552352] ? ksys_ioctl+0xa9/0xd0 [ 259.555985] ? __x64_sys_ioctl+0x73/0xb0 [ 259.560058] ? do_syscall_64+0x1b9/0x820 [ 259.564136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.569517] ? mark_held_locks+0x130/0x130 [ 259.573761] ? find_held_lock+0x36/0x1c0 [ 259.577830] ? graph_lock+0x170/0x170 [ 259.581665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.587214] ? check_preemption_disabled+0x48/0x200 [ 259.592239] ? check_preemption_disabled+0x48/0x200 [ 259.597272] __should_failslab+0x124/0x180 [ 259.601519] should_failslab+0x9/0x14 [ 259.605334] kmem_cache_alloc_node_trace+0x5a/0x740 [ 259.610373] __kmalloc_node_track_caller+0x33/0x70 [ 259.615318] __kmalloc_reserve.isra.39+0x41/0xe0 [ 259.620085] __alloc_skb+0x155/0x770 [ 259.623816] ? skb_scrub_packet+0x490/0x490 [ 259.628163] ? find_held_lock+0x36/0x1c0 [ 259.632244] ? neigh_del+0x30e/0x420 [ 259.635968] ? lock_downgrade+0x900/0x900 [ 259.640127] ? lockdep_hardirqs_on+0x421/0x5c0 [ 259.644719] ? lock_release+0x970/0x970 [ 259.648701] ? neigh_lookup+0x586/0x7c0 [ 259.652686] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 259.658157] __neigh_notify+0x8c/0x160 [ 259.662059] neigh_cleanup_and_release+0x7b/0xe0 [ 259.666830] neigh_del+0x31c/0x420 [ 259.670397] ? neigh_cleanup_and_release+0xe0/0xe0 [ 259.675339] ? __lock_is_held+0xb5/0x140 [ 259.679422] neigh_remove_one+0x20d/0x2d0 [ 259.683588] arp_req_delete+0x200/0x6b0 [ 259.687576] ? arp_req_set_proxy.isra.21.part.22+0x1f0/0x1f0 [ 259.693382] ? apparmor_cred_transfer+0x590/0x590 [ 259.698234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.703806] arp_ioctl+0x468/0xae0 [ 259.707368] ? __lock_acquire+0x7ec/0x4ec0 [ 259.711622] ? arp_constructor+0xd80/0xd80 [ 259.715869] ? graph_lock+0x170/0x170 [ 259.719684] ? graph_lock+0x170/0x170 [ 259.723505] ? __lock_acquire+0x7ec/0x4ec0 [ 259.727753] inet_ioctl+0x237/0x360 [ 259.731385] ? _parse_integer+0x134/0x180 [ 259.735543] ? inet_stream_connect+0xa0/0xa0 [ 259.739961] ? graph_lock+0x170/0x170 [ 259.743773] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.749318] ? graph_lock+0x170/0x170 [ 259.753130] ? _parse_integer+0x180/0x180 [ 259.757287] ? graph_lock+0x170/0x170 [ 259.761102] ? lock_release+0x970/0x970 [ 259.765085] ? arch_local_save_flags+0x40/0x40 [ 259.769696] ? find_held_lock+0x36/0x1c0 [ 259.773771] sock_do_ioctl+0xeb/0x420 [ 259.777583] ? ___sys_recvmsg+0x680/0x680 [ 259.781743] ? check_preemption_disabled+0x48/0x200 [ 259.786800] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 259.792613] ? kasan_check_read+0x11/0x20 [ 259.796800] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 259.802094] ? rcu_bh_qs+0xc0/0xc0 [ 259.805660] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 259.810881] sock_ioctl+0x313/0x690 [ 259.814521] ? routing_ioctl+0x890/0x890 [ 259.818594] ? ksys_dup3+0x680/0x680 [ 259.822313] ? find_held_lock+0x36/0x1c0 [ 259.826396] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 259.831365] ? routing_ioctl+0x890/0x890 [ 259.835440] do_vfs_ioctl+0x1de/0x1720 [ 259.839336] ? __lock_is_held+0xb5/0x140 [ 259.843408] ? ioctl_preallocate+0x300/0x300 [ 259.847823] ? __fget_light+0x2e9/0x430 [ 259.851824] ? fget_raw+0x20/0x20 [ 259.855294] ? __sb_end_write+0xd9/0x110 [ 259.859368] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.864917] ? fput+0x130/0x1a0 [ 259.868209] ? do_syscall_64+0x9a/0x820 [ 259.872189] ? do_syscall_64+0x9a/0x820 [ 259.876172] ? lockdep_hardirqs_on+0x421/0x5c0 [ 259.880765] ? security_file_ioctl+0x94/0xc0 [ 259.885201] ksys_ioctl+0xa9/0xd0 [ 259.888668] __x64_sys_ioctl+0x73/0xb0 [ 259.892567] do_syscall_64+0x1b9/0x820 [ 259.896485] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.901868] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.906806] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.911852] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.916878] ? recalc_sigpending_tsk+0x180/0x180 [ 259.921647] ? kasan_check_write+0x14/0x20 [ 259.925900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.930792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.935992] RIP: 0033:0x457569 [ 259.939193] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.958108] RSP: 002b:00007f95ff817c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.965824] RAX: ffffffffffffffda RBX: 00007f95ff817c90 RCX: 0000000000457569 [ 259.973112] RDX: 0000000020000040 RSI: 0000000000008953 RDI: 0000000000000004 11:29:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x2000000e, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:39 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x401, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)="637075616363ab5275736167655f70657263707500", 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="458b0f0617"], 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d5, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000500)="05b338fd590b904079afd6f1f9ccb39e64726113dc9bb9bed63d4f8a772ed8dada089f4580bc01affc67", &(0x7f0000000600)=""/83}, 0x18) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x4, 0x0, 0x81, 0x0, 0x0, 0x3, 0x20, 0xd, 0x0, 0xc, 0x0, 0x2, 0x0, 0x10000, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7fffffff, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xae, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x0, 0x70, 0x40, 0x12e3, 0x3, 0x5, 0x0, 0x20, 0x1, 0xf, 0x0, 0x7ff, 0x7, 0x2b2, 0x1, 0xa7, 0x6, 0x9, 0xffffffffffff8001, 0x9680000000000000, 0x139f3b77, 0x8, 0x7, 0x7, 0xec, 0x400, 0x1, 0x2, 0x81, 0x0, 0xfffffffffffff4f1, 0x261, 0x8, 0xffffffff, 0x0, 0x6, 0x6, 0x2, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x100, 0x3, 0x0, 0x3, 0x10000, 0xc7, 0x5}) write$cgroup_int(r3, &(0x7f0000000080)=0x1600, 0x297ef) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x6, 0x8, 0x0, 0x0, 0x22}, 0x2c) 11:29:39 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x81000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 259.980387] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 259.987662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95ff8186d4 [ 259.995148] R13: 00000000004c05b8 R14: 00000000004d07b0 R15: 0000000000000007 11:29:39 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00R\x00', 0x1132}) 11:29:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x34, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:39 executing program 0 (fault-call:21 fault-nth:3): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000380)=""/148, 0x94}, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000002500)={&(0x7f0000000280)=@llc, 0x80, &(0x7f0000002480)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000340)=""/25, 0x19}, {&(0x7f0000001440)=""/42, 0x2a}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x4, &(0x7f00000024c0)=""/33, 0x21, 0x5}, 0x2) close(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x4002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0xffff}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x8, 0x5, 0x1f, 0x9, 0x10, r1, 0x8}, 0x2c) r2 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x100, 0x0) 11:29:39 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x6000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00i\x00', 0x1132}) 11:29:40 executing program 1: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2000000000002, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xd89) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'rose0\x00', 0x4000000000002000}) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x2, 0xfffffffffffffff7, 0x8, 0xf678, 0x0, 0x7, 0x200, 0x1, 0x0, 0x4, 0x1, 0xfff, 0x0, 0x100000001, 0x2, 0x5, 0x4, 0x1f, 0x6, 0xee6c, 0x100000001, 0x8, 0x44f1, 0x4, 0x6, 0x3ff, 0x8, 0x60f8, 0x7803, 0x1, 0x81, 0x86, 0x1, 0x400f480a, 0x1ff, 0x990, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x4000, 0x3f, 0x0, 0x7, 0x8, 0x4, 0x6}, r3, 0x0, r2, 0xb) socketpair(0x0, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x8, 0x8}, 0xc) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x6cff, 0x8, 0x0, 0x0, 0x80000000, 0xfffffffffffffffc, 0x7, 0x0, 0x0, 0x5, 0xa0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x79f7bf0a, 0x0, 0x0, 0x0, 0x81, 0x9d8}, r3, 0x0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2000000000000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000040)="8dbaac5a2740d1", &(0x7f00000002c0)=""/74}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x890c, 0x730020) 11:29:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x37, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:40 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8953, &(0x7f0000000040)=0x2) 11:29:40 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xac05]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x69, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00d\x00', 0x1132}) 11:29:40 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x1a0]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x34, &(0x7f0000000000)="b90703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:40 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2, &(0x7f0000000040)=0x2) 11:29:40 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x7, &(0x7f0000000180), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x9, 0x8}, 0xc) sendmsg(r0, &(0x7f0000000840)={&(0x7f00000000c0)=@l2={0x1f, 0xc6, {0x0, 0xfe2, 0x8, 0x200, 0x20, 0xc142}, 0x0, 0x400}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="be9b3556fcd2b03713b859ccec029692f62aa25124f50af20c63810ead17a592bf17fe208044d6ba9b2ba00cff64afe9727e833e99c61adf70e95366c3a1951300535cc9835e4ffa0383143fdc870c2e3302a7f91b92040990e1999c19bb1c77b2ecb0e93b418fa363b0b3af", 0x6c}, {&(0x7f0000000280)="c925485eb3da6d7024451ede4c0df965c4433decd35cd149b3b070445925b72304222f0f327b4676d79109b0a437e12e6b0b62d9fdfaaee04466444c1bf897d6a6c101069e4a70274b749b60b1dffe73fcef6fbdadaacde8c867d1733873bed5a4f665df75f51acdde8c0447fe8c3c", 0x6f}, {&(0x7f0000000300)="cd358e8b8b8da77729c82a5f582f426a449928103ee8daea6499e24443a7333cd3e976fe87fb5e32c8eedf1b777e5f1013813987cf7a77aab846a4315bddd929076d8148", 0x44}, {&(0x7f0000000380)="6cd787fc25853081e46aae080b35a0bc52b340ab197938defac80bf27ffbbc85475e47e88c2849c2e17cc65029fb8e38ffdbfd914722111d5278a848519b7bea586bccf1cd17ab9867e74264e18055b518c923f25ab409402c8e6b584dc0b8eb352af9635644e41654e5fc5eeed57827d292aac01ca6c4c550b6c8d008f2bd5237a13c99ca699b4485d65014fd7ebea2fc82163d75a499b77e73810c02fff460d783a278f47122fb24f76f1a8f5d240a6006966d733bdc28d5501afe590216c212536eda234034210aead78a965439a90b02d52f6c2e366094383c5068a3ef198d84b85fe6fbb4", 0xe7}, {&(0x7f0000000480)="c8d5a4091bfdcb2b9644e5c596f0a1c9f2d410ba9a42a60560e7cf8b378fb042953ce095ea7198fca15c5875d26dafc6e83a58345b013801f592f9c2d25263c58f015ace80d3b2645a55adab95075d17d2c222da33a2f059a8ea94ddb40747f4c9cc3d5c8e884dd97a7a0972a96aaf6607c3", 0x72}, {&(0x7f0000000140)="f0e0b9d623560a9d7bbeb0cd041f679f28d48891bd05ec58e569b0ae7fbc3ed07babe7d1874829d5f7c7f8b0e4630cfb4d33d03e5555e7e04e3035", 0x3b}, {&(0x7f0000000500)="8c222152af325a95e46dbe00dd275b7a7323397eb6d0af715a35663911cacbecd910d57aa45fbb24963ffe57e5829545cfdaa7ccc3f8a6bc51ab4084e4e8d13977989fed571ecec742d4f8629ad686c090ef64b4ed35", 0x56}], 0x7, &(0x7f0000000600)=[{0xe0, 0x10e, 0x80, "3e630a03ba6a8c55813ee7eede992746ee03ed2495557c5ce6d120c76e3c619b602601b488b83cb149eff878400e4566d2e439d5a1f50e254d3c8e88552db39ca14376cc2b0aa51bdf5059929c51dd5a36fed94571b7dd0fb57611579843fa60d4d6a00039f48dd45e6e13f849748da42164ef9c8ee99843caa34cffdbede6871c701de54eae3a612f00d87a4b76d056a97918aa5947286f6f400280dff653b900c20b6c007f48357399a10cac413beb76a28d0e9e259a4c6b35741c325e5864781a27f45670894b356fb9a16401"}, {0x30, 0x115, 0x0, "b58a8803211248085cc20f58953016d4f9e550f71995220494937260fa526ce3"}, {0x20, 0x1ff, 0x4, "80541c9b1f81afd0c7"}, {0xf0, 0x119, 0x3, "708098e905a0ab7ab5c8272d59b7606734706874011747637190932febe94c74ed99589c685a9bca1f31ca348ae29f80ee22e097a453f8de33e5293b631cac6e0db361142ddff8e3bb1ecd647d016720a4f157a6420adbf602312f15d2a6a454bd98c748544aac8f99b35db26ee14c5ed3cbfd1b80afa04ae2721ec97a550b5133f223b2aeed6629fe930df65e618e1c393b7e5e0e68432d337bcb7e166a2fae3d364259479c22f4c199f897ac1ae34a1a7055dcbb5b33e1f5351f134c3bda39fab52cf871dfacca39acada638e0238866051997835055e3875db1a9"}], 0x220, 0x8000}, 0x800) 11:29:40 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000ac00", 0x1132}) 11:29:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b93403e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:40 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x1100]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:40 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2, &(0x7f0000000040)=0x2) 11:29:40 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8980, &(0x7f0000000040)=0x2) 11:29:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b93703e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:41 executing program 1: openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)="2f677288b9702e73746174007d88231ba79cfad631b04fb68d9fb4db977cf33fec62de80dfdfb5acfaf3d5eeb38f73553b6cc55a955c21bd4862af8f2c6bf5a75682774d76fe52fdecdf01de8c7fe9105e629655442851b5a5415cd4b43dd221c8bcb4b8b6eaaf6299aee1967b237166322ddc70aa806d384f45322e", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x7fffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b80)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000800)='cgroupwlan1^\x00'}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000ac0)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440), 0x12) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0xfe6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xffffffffffffde0e, 0x0, 0x0, 0x6, 0x6, 0x0, 0x5, 0x9, 0x0, 0x10001, 0x7, 0x77, 0x401, 0x4, 0x0, 0x3fe0000, 0x10001, 0x7ff, 0x8, 0x0, 0x6, 0x0, 0x7ff, 0x4, 0x7fff, 0x80000000, 0x0, 0x8000000000000000, 0x1, @perf_bp={&(0x7f0000000200), 0x3}, 0x800, 0x46d, 0xffffffffffffffff, 0x7, 0x7, 0x0, 0xffffffffffffff01}, 0x0, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffdb) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0x8}, 0xc) socketpair(0x1f, 0x80006, 0xb36, &(0x7f0000000b00)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40286608, 0x20000101) 11:29:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001600", 0x1132}) 11:29:41 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x60]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:41 executing program 5: r0 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r0, &(0x7f00000027c0)={&(0x7f0000000000)=@nl=@unspec={0x2001001000000000}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1400000000000000290000003400000004fdff00"], 0x14}, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x4, 0x8}, 0xc) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x8, 0x1000, 0x5, 0x8, 0x0, 0x9, 0x10, 0xb, 0x1, 0x4, 0xb1, 0x3, 0x0, 0x3, 0xfffffffffffffffc, 0x8001, 0xffff, 0x81, 0x7, 0x2, 0x5, 0x100, 0x80000001, 0x5, 0x1000, 0x5, 0xd056, 0x6, 0x12000000, 0xfffffffffffffffb, 0x7f, 0x7f98, 0x6, 0x3, 0x3, 0x236, 0x0, 0xca, 0x2, @perf_config_ext={0xfff, 0x30}, 0x8, 0x91, 0x6, 0x7, 0x0, 0xff, 0x1ff}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000100)}, 0x10) sendmsg$kcm(r0, &(0x7f00000018c0)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000280)="9c10ebddfc5749aaf54f15601d10dcd2acb406165aa1bbcb4edec0ea602449fa47cd8d6d358e25c6e21a5f24bd076443544842b57c821947d7c8d4a9f36a24b994f4eca30de02eeaf052d98717482b8de96a9ba75658e189e9effc9effee965fcc58f081639eade0b1b09d26a013cc00e678f91e3f82120e4139025441f2f485b42108879ef5d919ca9e7c8a8be1a35ab00e311b57644cc792dd25f12e0b67eb9a3d5374dfbab1a2e3b1e9dcc6b7f15f5e1c20b21ebc9bfa6c5b45ae24f15f9ce38519a304856ef59e5b6cbd5a8bee4f46704619df70f325ed737f47ef112c759a55edde3751b639ef4854e74387ff49", 0xf0}, {&(0x7f0000000380)="75f929cebc1bdd497daeb2f76e5bdace3dce6169da18c063fd93da190adf243c6e41d6f5a9a82208cf40dced795ebb75cf75d585821c3ac14a33475dd99ccc62f134b148efa70ba0da1956b203cdf00cad9dd61c8d8de4169c3d72d4095d9262d3f6419f5ac24ee3d5d499c9793b45a1ac53761145d6974d42e17c039b1a61e150d66b373b48be288cc8b9c59c314eb5d3fb178f1f1d752d0eba4956b091d8f91ee7d90ba11d2c565c0d503d6fdd56211a63ac809defd5636915d620a2dae40a06188cecac560e07", 0xc8}, {&(0x7f0000000480)="704dc152f77d47ee6fc1379778c4cdb3b91128363219ce51a3bec59bedb39f40b563af1cd611ff760c287b7abd5e16f9ba72a88d172d261c9464f57b30ac287a86c07df358cb47814422bf92ad668136497ca06115b59abf324ee80c108f8be23bf17b67d855d48cbef6b942a054d9a97ba48c804c8227ea83dfb0", 0x7b}, {&(0x7f0000000500)="81515ed08dac9223ff3742c8e42fd0394ddd87b0ae80d2e058561bf2a494f8f56e6363711a48705f2b40ec94aad7ae01e5b16c762e415cfb4d0e425f239681ad672a774a68a7cf17dffb311a55a7e2e6942dfd1ae574043155155f66e8f21e2179de02eba47e7c06ff15c4fcf3f7b46da438dd26da78fd77734536698deb746258ab35edfbca656ea5c66d9d5cf435a83c057c56c5bb71370059fdb0fa39ebb9b7c2386e3231bed00fa86a6e5d42267895439b6572e1372e754b3d9e06a16ceb697de454b0fc01f6e8d7be7715de57f76319d9e5dc9ea67788e27cb07d0441d257", 0xe1}, {&(0x7f0000000600)="02ba04193b08b4d1a955ca6a1b7a328261c181b8c5c8b1ac6a38899065061f16f97a5e83d4dd23722805de1869", 0x2d}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="f4ec038317a0c6480bcb0068faf8e6ed9808384ec3fe2b25e4a66aef576e881371407f733bb8b8", 0x27}, {&(0x7f0000001680)="396fb66681153d1c645573b3bf3c155c3aa4aae5016473a854e9cd5e85f3d25ea06e2752b36d618481350ae47b0be32df9821c51dba8e6aa5ed73a679f4b3d9fdaf102840ef31dfe9232b0b17e50b93c565ad92102e64bb9d6ff31529a40e8439fa4bec66c1b169cff715d3acced9eb143586f0701cb601e1db3fff60b4c760ae56509586ff8b760f733357845b2e387e94ebcb3608fc4ea5222930bc835fdf09a9ed647be", 0xa5}], 0x8, &(0x7f00000017c0)=[{0xc8, 0x10d, 0x5, "ad1224f45cf6dd20ac869db1661bb12d1cb95ce152b81c2f51ed462b0f56bcc847b8f636a949e09d0f6536ddd98964d637224b0755bd244919c0282d58d37637aea3de51c59ba734e98a239980a66ccc96fe58daa6efedba7a3f3035f9fb80ef966ad106f411475b68fa34a4bf80768d6e478e5cc58efc9585455b6c479028359e0387238ad782e56ea6dc0c185ac1152efe3fd6dee17c3f200dbebbe9c97becc2c79d86acea03604d57e40312ffa263725944a3061b"}], 0xc8, 0x10}, 0x40040) 11:29:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b96903e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:41 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x5460, &(0x7f0000000040)=0x2) 11:29:41 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x88480000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:41 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8980, &(0x7f0000000040)=0x2) [ 261.582912] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 16777215 (only 16 groups) 11:29:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90603e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00\'\x00', 0x1132}) 11:29:41 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8981, &(0x7f0000000040)=0x2) [ 261.753868] net_ratelimit: 513 callbacks suppressed [ 261.753876] protocol 0800 is buggy, dev ip6_vti0 11:29:41 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x1000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90203e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x350, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xd932}, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) recvmsg$kcm(r1, &(0x7f0000002e00)={&(0x7f00000028c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000002940)=""/172, 0xac}, {&(0x7f0000002a00)=""/54, 0x36}, {&(0x7f0000002a40)=""/21, 0x15}, {&(0x7f0000002a80)=""/155, 0x9b}, {&(0x7f0000002b40)}, {&(0x7f0000002b80)=""/18, 0x12}, {&(0x7f0000002bc0)=""/35, 0x23}, {&(0x7f0000002c00)=""/169, 0xa9}], 0x8, &(0x7f0000002d40)=""/147, 0x93, 0x101}, 0x2021) sendmsg$kcm(r1, &(0x7f0000002e40)={&(0x7f0000000080)=@can={0x1d, r2}, 0xfffffffffffffe1d, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0xfffffffffffffdd9}, 0x8000) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000180)=@l2, 0x80, &(0x7f0000002740)=[{&(0x7f0000000400)=""/86, 0x56}, {&(0x7f0000000040)=""/21, 0x15}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/159, 0x9f}, {&(0x7f0000002580)=""/115, 0x73}, {&(0x7f0000002600)=""/190, 0xbe}, {&(0x7f00000026c0)=""/86, 0x56}], 0x7, &(0x7f00000027c0)=""/217, 0xd9, 0xb30}, 0x0) 11:29:41 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00I\x00', 0x1132}) 11:29:41 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8983, &(0x7f0000000040)=0x2) 11:29:41 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8981, &(0x7f0000000040)=0x2) 11:29:41 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x80350000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 262.236158] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 16777215 (only 16 groups) [ 262.307762] protocol 0800 is buggy, dev ip6_vti0 [ 262.327811] protocol 0800 is buggy, dev ip6_vti0 11:29:42 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x65580000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90403e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000b000", 0x1132}) 11:29:42 executing program 1: socketpair(0xc, 0x6, 0xbce2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x1ff) r3 = gettid() write$cgroup_pid(r0, &(0x7f0000000100)=r3, 0x12) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x8, 0x401, 0x0, 0x2, 0x0, 0x1, 0x2000, 0x8, 0x5, 0xffffffffffffffff, 0xe06, 0x5, 0x7fff, 0xba, 0x84, 0x5, 0x32e, 0x1d69, 0x7, 0x9, 0x8, 0x47a3, 0x3, 0x3, 0x6f, 0x7, 0x1, 0x89, 0x0, 0xa5a, 0x9, 0x100000001, 0x2, 0xbe46, 0x100000000, 0x2, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x38}, 0x8000, 0x6, 0x2, 0x5, 0x302f549b, 0xfffffffffffffffe, 0xeee}, r3, 0x3, r0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8203) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) openat$cgroup(r1, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x101, 0x7, 0x9, 0x7f, 0x0, 0x9, 0x4000, 0x1, 0x3, 0x8, 0xfffffffffffffffc, 0x9, 0x1, 0x800, 0xd4, 0x0, 0x2, 0x6b, 0x5, 0x1, 0x6, 0x4, 0x3ff, 0x9, 0x124, 0x7fff, 0x0, 0x5, 0x6, 0x1, 0x6, 0x6, 0x0, 0x2, 0x80000000, 0x100, 0x0, 0x9, 0x0, @perf_config_ext={0x3, 0xffffffffffffffc0}, 0x2, 0x9, 0x3, 0x0, 0x8, 0x40, 0x7}, r3, 0x4, r4, 0x8) write$cgroup_pid(r1, &(0x7f00000002c0)=r3, 0x12) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'bond_slave_0\x00', 0xe820}) write$cgroup_pid(r0, &(0x7f0000000340)=r3, 0x12) openat$cgroup(r1, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000003c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000440)={r5, r4}) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000480)) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) r7 = gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000500)=r0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x296d09ff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r0, &(0x7f0000000540)="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", &(0x7f0000001540)=""/170}, 0x18) openat$cgroup_ro(r2, &(0x7f0000001640)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001680)=',vboxnet0\x00') socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000016c0)) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000001700)) perf_event_open(&(0x7f0000001780)={0x7, 0x70, 0xfff, 0x0, 0x9, 0x4, 0x0, 0x10001, 0x8000, 0x4, 0x3ff, 0xfffffffffffff001, 0x40, 0x3, 0x5, 0x1, 0xffffffff, 0xfffffffffffffffa, 0xfffffffffffffffb, 0x20, 0x8, 0x1ff, 0x5, 0x7, 0x3, 0x0, 0x2, 0x6, 0x3, 0xad, 0x9, 0x8001, 0x3, 0x4, 0x200, 0x4, 0x9, 0x11ba, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000001740), 0x3}, 0x1000, 0xf15, 0x401, 0x6, 0x0, 0x100000000, 0x5}, r7, 0xa, r4, 0xa) 11:29:42 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x891a, &(0x7f0000000040)=0x2) [ 262.539560] protocol 0800 is buggy, dev ip6_vti0 [ 262.545053] protocol 0800 is buggy, dev ip6_vti0 [ 262.550051] protocol 0800 is buggy, dev ip6_vti0 11:29:42 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4305]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00c\x00', 0x1132}) 11:29:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90702e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:42 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000b100", 0x1132}) 11:29:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x9, 0x100000000000914, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000300)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000100)=""/25}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000300)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) 11:29:42 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xffffff7f00000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:42 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xe, 0x7, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0xa}, @ldst={0x3, 0x3, 0x6, 0x3b62c76f3299c8da, 0x8, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000140)='GPL\x00', 0x7fffffff, 0xae, &(0x7f0000000200)=""/174, 0x0, 0x1, [], 0x0, 0x2}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r1, 0xd}, 0x14) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x7, 0x1, 0x6a, &(0x7f0000000040)=[0x0], 0x1}, 0x20) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000), 0x12) 11:29:42 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8918, &(0x7f0000000040)=0x2) [ 263.213533] protocol 0800 is buggy, dev ip6_vti0 [ 263.234799] protocol 0800 is buggy, dev ip6_vti0 11:29:43 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:43 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000080), 0x4) socketpair(0x8, 0x3, 0x240000000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@generic={0x0, "cd4a71bb9a4c78b2e0ec56443f79e6dd3d11a1e5a6859a5dfa9b6452a03ae0ca59e082b55c80d8dd0c3488f537d6bf1cbf5bbe3456bc9a8bb7fa412cb74c4829d823b0fdb80b380f853358a933d8a9cc1ccca5653a9005fbb9e2c08b05b323e104a541003ff4207277d5528f51c5eb779336b3c6df938a37c330a9fde59f"}, 0x80, &(0x7f0000000300)}, 0x0) 11:29:43 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x400000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90734e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00"\x00', 0x1132}) 11:29:43 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1, &(0x7f0000002300)}, 0x0) socketpair(0x8, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x200, 0x8001, 0x7ff, 0x7, 0x0, 0x9, 0x0, 0x4, 0x1f, 0x2, 0x3f, 0xff, 0x5, 0x6, 0x7fffffff, 0x4, 0xb81, 0x5, 0x6, 0x6, 0x8, 0x10001, 0x7f, 0x100000000, 0x1, 0x5, 0x8, 0x1, 0x20, 0x0, 0x0, 0xa99b, 0x3, 0x6, 0x6, 0x800, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x810, 0xfffffffffffffffc, 0x3, 0x1, 0x5, 0x9, 0xffffffffffffffff}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x2) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)=r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) 11:29:43 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0189436, &(0x7f0000000040)=0x2) [ 263.455011] protocol 0800 is buggy, dev ip6_vti0 [ 263.470789] protocol 0800 is buggy, dev ip6_vti0 11:29:43 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa805000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90737e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 263.542312] netlink: 3302 bytes leftover after parsing attributes in process `syz-executor5'. [ 263.581738] netlink: 3302 bytes leftover after parsing attributes in process `syz-executor5'. 11:29:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00t\x00', 0x1132}) 11:29:43 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8918, &(0x7f0000000040)=0x2) 11:29:43 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x8060000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:43 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90769e69ebf08bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:43 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8915, &(0x7f0000000040)=0x2) 11:29:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00M\x00', 0x1132}) 11:29:43 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0189436, &(0x7f0000000040)=0x2) 11:29:43 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x4000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf69bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009800", 0x1132}) 11:29:44 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x86ddffff]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf05bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:44 executing program 5: recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000140)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/182, 0xb6}, {&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000280)=""/178, 0xb2}], 0x3, &(0x7f0000000340)=""/142, 0x8e, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x6, &(0x7f0000001000)=ANY=[@ANYBLOB="b703000007ffffff9403000099ca0000270300000200000027024d0004000000b7000000000000029500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41f00, 0x0, [], r0, 0x4}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={r1, 0x50, &(0x7f0000000e00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={r1, 0x50, &(0x7f0000000ec0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000fc0)={r1, 0x50, &(0x7f0000002040)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f80)={0x0, r1, 0x0, 0x1, &(0x7f0000000d40)='\b', r2}, 0xffffffffffffff99) perf_event_open(&(0x7f0000000cc0)={0x3, 0x70, 0x40, 0x1, 0x7, 0x3f, 0x0, 0x8, 0x4, 0x8, 0x2, 0x100, 0x6, 0x7fff, 0x1, 0x8, 0x5, 0xfff, 0x3, 0x82, 0x80, 0x3, 0x3, 0x1, 0x7, 0x1f, 0x1000000000, 0x4, 0x1, 0x1, 0xfffffffffffffff8, 0x866, 0x2, 0x14, 0x0, 0x1, 0x1, 0xae3, 0x0, 0xb16, 0x6, @perf_config_ext={0x9, 0xbd5f}, 0x0, 0x5, 0x5, 0x3, 0x9, 0x2, 0x60000000000000}, r3, 0xd, r1, 0x9) recvmsg$kcm(r1, &(0x7f0000000c80)={&(0x7f0000000440)=@ipx, 0x80, &(0x7f0000000b40)=[{&(0x7f00000004c0)=""/156, 0x9c}, {&(0x7f0000000580)=""/244, 0xf4}, {&(0x7f0000000680)=""/59, 0x3b}, {&(0x7f00000006c0)=""/233, 0xe9}, {&(0x7f00000007c0)=""/3, 0x3}, {&(0x7f0000000800)=""/172, 0xac}, {&(0x7f00000008c0)=""/212, 0xd4}, {&(0x7f00000009c0)=""/71, 0x47}, {&(0x7f0000000a40)=""/246, 0xf6}], 0x9, &(0x7f0000000c00)=""/118, 0x76, 0x3}, 0x101) socketpair(0xa, 0x5, 0x3, &(0x7f0000000dc0)) 11:29:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009600", 0x1132}) 11:29:44 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:44 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8916, &(0x7f0000000040)=0x2) 11:29:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf2fbb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:44 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xa00]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009900", 0x1132}) 11:29:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000070000000500000000000000950000e6f6e3fc00"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000d00)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000bc0), 0x0, &(0x7f0000000c40)}, 0x0) 11:29:44 executing program 5: gettid() r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0x67, &(0x7f0000000040), 0x4) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e88, 0x0, @mcast2={0xff, 0x2, [0xe82b, 0x0, 0x0, 0x0, 0xfe80]}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000014c0)="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", 0x1000}, {&(0x7f0000000200)="df742e12ad452c512dd2e60a049e25a1db2f9d54f70e88f354b066135c60c0448714201d", 0x24}, {&(0x7f0000000240)="832ba50ba9281ff1e027b7196c09f3eba98e6eb71229ceb01312f2372c6b74a27725fb39a94df17bf05829417f315e51b4b38ed315a5a696306fe43b574fe58b2ae547df356977220fd55a9d5496d3c51533faf32682e4a86744048b76515d42eb26b8706eb211264f2f885b4cb97e61b436ed468c632a0c027b2639cca28222c4a413d06791fee6d740ca8bb5e2a53aba5835faeb2328e272338766cf4695c763fc8c100a05e4952a1e6a97f63491130b7ec0cf519bd6862b8c45c2f2f0f4fba346d965bf8d51b258638361", 0xcc}, {&(0x7f00000024c0)="30a30afab05c56c6b40a4fca434a4ff9c3f848ce740f1f6a7101f6288142e0851fd49971637f7aeda3e74ccc7e6f600b579a60393aad0692d413a700fe6403fed66585d89c6c1ee430ee41fc14cbe8d8bd23fe6fd1a7cf77df3da4ffc1dba8d41f36f9043999c6d1c1b55bfed9c4b3ea3b2699a95b2fd938a676bb6c", 0x7c}], 0x4, &(0x7f0000000180)}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000380)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) close(0xffffffffffffffff) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6609, 0x0) 11:29:45 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x6488]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf37bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000e900", 0x1132}) 11:29:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000a00)}, 0x0) socketpair$unix(0x1, 0x10000000000000, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="7a0af8ff75256400bfa100000000000007010000f8ffffffb7020000040034167b110000000000008500000005000000b70500000000ea9a9500000600000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000240), &(0x7f00000002c0)="f1e3b3"}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x2, 0x70, 0x3, 0x70c, 0x200, 0x800, 0x0, 0x3, 0x44020, 0xc, 0x2, 0x9d, 0x2e400000, 0x4, 0x9, 0xc6c3, 0x0, 0x0, 0x5, 0x0, 0x173, 0xffffffff, 0x4, 0x1, 0x9, 0x1, 0x5dbe, 0x7, 0x100000001, 0x3, 0x0, 0x4, 0x0, 0x6, 0x80000001, 0x9, 0xffff, 0xfff, 0x0, 0x7, 0x4, @perf_config_ext={0x1ff, 0x3}, 0x1040, 0xada, 0xfffffffffffffc01, 0x6, 0x0, 0x950, 0x43c}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002540)={r2, 0x0, 0xe, 0x19, &(0x7f0000002480)="e4691a18d261eda75c328ec11b1a", &(0x7f0000002500)=""/25, 0x464}, 0x28) 11:29:45 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x11]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf34bb64879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:45 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:45 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00>\x00', 0x1132}) 11:29:45 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x890b, &(0x7f0000000040)=0x2) 11:29:45 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8916, &(0x7f0000000040)=0x2) 11:29:45 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x806000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:45 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0xeffdffff00000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb2b879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f700", 0x1132}) 11:29:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x6, 0x2, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000006c0)={r0, &(0x7f00000004c0)="21e64b9b5bdb9e3afa93e63215f1f43fa9bfbd6b5f892adbd2bf696268b3dc2ad63dc911adc24a64ae252e89408cb6ca7b4643ebda1a1fecf09b5b25d2ff370f178799373149f6b9e83a78a0c35f2c079ebdb2b9216d0c0c2629de77ca8387b9bb7b5048d3af0dd6884474a88c3eef7f3abee3a3322269f262e59ed0fea0db04a2819d53727c481ddbaa83edc5c46ee0bb9846d2bb1c0b4fb986e171bca85ec317a85e76466a65ed63c67e432ccee3a9de37bd084701e90ab849f45332e60fa8fe668cd20ab5b9698cd9ed9556bf87986f7773e117d3078c45a45a8f8f3426", &(0x7f00000005c0)="35d01e5d156c0236c37a84a94e67ef0d0226f0a00c2a61f2fe31244fbd5532eb98381908aba0d9affdd1d18b8705ba7190dbe28e14c0e7a07ab40e255648a5ce0ec19c22fc66fe19040b98eeebe507746ed87a384a98806fda5b89e997c1055844f893c2c9d1109f607073ee28d48c3ed2556bfa4293779a0d8a0fe3345353a69dc1f758597fa90a2231479dbf654a927a0c00634a8b041420fd608053afea892cdfdeee24c35073ebb52f5094642e080b17d24c28de96b9923a45ad2b318d3b20ee0d058dd92e588cb10f3a3d406a034b344b757dedf5e24f73f66c5f3f3a6ecdcef8030ae2fe"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r0, 0x28, &(0x7f00000003c0)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", &(0x7f0000000080)=""/98}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), &(0x7f0000000080)=""/140}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000340)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x10, &(0x7f0000000300)=@raw=[@generic={0xb25, 0x909, 0x3b2, 0x7f}, @alu={0x4, 0x6, 0x0, 0x7, 0x5, 0xfffffffffffffffe, 0xfffffffffffffffc}, @generic={0x3d1, 0xfff, 0x8, 0x7}, @ldst={0x2, 0x2, 0x0, 0x5, 0xa, 0x100, 0xfffffffffffffffc}, @exit, @map={0x18, 0x7, 0x1, 0x0, r0}, @jmp={0x5, 0xcc, 0xb, 0xf, 0x4, 0xfffffffffffffffc, 0xffffffffffffffff}, @generic={0xffffffffffffff00, 0x100000001, 0xb8, 0x8}], &(0x7f0000000380)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x7}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f00000003c0), &(0x7f0000000200)=""/208}, 0x18) 11:29:46 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x894c, &(0x7f0000000040)=0x2) 11:29:46 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x65580000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb75879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:46 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:46 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x890b, &(0x7f0000000040)=0x2) 11:29:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb2d879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000cd00", 0x1132}) 11:29:46 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x88480000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:46 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8935, &(0x7f0000000040)=0x2) [ 267.047173] net_ratelimit: 1048 callbacks suppressed [ 267.047182] protocol 0800 is buggy, dev ip6_vti0 11:29:46 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x8864]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 267.094312] protocol 0800 is buggy, dev ip6_vti0 [ 267.099354] protocol 0800 is buggy, dev ip6_vti0 [ 267.120016] protocol 0800 is buggy, dev ip6_vti0 [ 267.127412] protocol 0800 is buggy, dev ip6_vti0 [ 267.132481] protocol 0800 is buggy, dev ip6_vti0 [ 267.143396] protocol 0800 is buggy, dev ip6_vti0 [ 267.153240] protocol 0800 is buggy, dev ip6_vti0 [ 267.184276] protocol 0800 is buggy, dev ip6_vti0 11:29:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230000300", 0x1132}) 11:29:46 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x7c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) socketpair(0x7, 0x80804, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) [ 267.202314] protocol 0800 is buggy, dev ip6_vti0 11:29:46 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x11]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:47 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0045878, &(0x7f0000000040)=0x2) 11:29:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000a800", 0x1132}) 11:29:47 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ip_vti0\x00', 0xb310}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)="2f6465762f6e65742f74756eff", 0x241, 0x0) r4 = socket$kcm(0x2, 0x0, 0x2) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xffffffba) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000400)=r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r4}) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r5, &(0x7f0000000340)="21d245700e567701ffde58b77b48c51bcbc3af61a36b9b2f67223c9dc270c534bf775f7334762b4a1f9268e005c245d63ae59f02025e83d3fe906fd4bace49bad8d92e3109343d265ecd237b0323de121112fd4a22342b3e126d8ae523c795a214a427ce4ac8f8b0339e618a174bcff52d7406fafdda155fac98beb5665fabebc7403c60c80511180f5a559a72b4c9ef40f4415b1a11b3030dcf573496f3f8bbba4c1ee4594c0631698adcb1e6eb9afd1d11fff062f56dc79d03e62d2ca03440", &(0x7f0000000200)=""/64}, 0x18) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x401, 0x33e5, 0x2, 0x0, 0x2, 0x8084, 0x4, 0x80, 0x9, 0xfffffffffffffff9, 0x7293, 0x966, 0x3, 0x5, 0x1, 0x1f, 0x1000, 0x5, 0x4, 0x101, 0x0, 0x80000000, 0x8000, 0x2, 0x5, 0x3, 0xc9c8, 0x4, 0x0, 0x8, 0x9, 0x8000, 0xdc3, 0x0, 0x6, 0x0, 0x8001, 0x1, @perf_config_ext={0x3, 0x6}, 0xc53, 0x80000000, 0x80000000, 0x1, 0x200, 0x7, 0x80000001}, 0x0, 0x4, r0, 0x0) socketpair(0xa, 0x3, 0x8, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x1ff) 11:29:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb73879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:47 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:47 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xa805000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001100", 0x1132}) 11:29:47 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8955, &(0x7f0000000040)=0x2) 11:29:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb2e879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:47 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00@\x00', 0x1132}) 11:29:47 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x8864000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:47 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x89a0, &(0x7f0000000040)=0x2) 11:29:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb69879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00?\x00', 0x1132}) 11:29:48 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ip_vti0\x00', 0xb310}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)="2f6465762f6e65742f74756eff", 0x241, 0x0) r4 = socket$kcm(0x2, 0x0, 0x2) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0xffffffba) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000400)=r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r4}) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r5, &(0x7f0000000340)="21d245700e567701ffde58b77b48c51bcbc3af61a36b9b2f67223c9dc270c534bf775f7334762b4a1f9268e005c245d63ae59f02025e83d3fe906fd4bace49bad8d92e3109343d265ecd237b0323de121112fd4a22342b3e126d8ae523c795a214a427ce4ac8f8b0339e618a174bcff52d7406fafdda155fac98beb5665fabebc7403c60c80511180f5a559a72b4c9ef40f4415b1a11b3030dcf573496f3f8bbba4c1ee4594c0631698adcb1e6eb9afd1d11fff062f56dc79d03e62d2ca03440", &(0x7f0000000200)=""/64}, 0x18) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x401, 0x33e5, 0x2, 0x0, 0x2, 0x8084, 0x4, 0x80, 0x9, 0xfffffffffffffff9, 0x7293, 0x966, 0x3, 0x5, 0x1, 0x1f, 0x1000, 0x5, 0x4, 0x101, 0x0, 0x80000000, 0x8000, 0x2, 0x5, 0x3, 0xc9c8, 0x4, 0x0, 0x8, 0x9, 0x8000, 0xdc3, 0x0, 0x6, 0x0, 0x8001, 0x1, @perf_config_ext={0x3, 0x6}, 0xc53, 0x80000000, 0x80000000, 0x1, 0x200, 0x7, 0x80000001}, 0x0, 0x4, r0, 0x0) socketpair(0xa, 0x3, 0x8, &(0x7f0000000240)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x1ff) 11:29:48 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xffffff7f00000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb6c879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:48 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x890d, &(0x7f0000000040)=0x2) 11:29:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230390300", 0x1132}) 11:29:48 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb44879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300200", 0x1132}) 11:29:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb78879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:48 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xa0010000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:48 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8919, &(0x7f0000000040)=0x2) 11:29:48 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000b400", 0x1132}) 11:29:49 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xe000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb0a879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:49 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8941, &(0x7f0000000040)=0x2) 11:29:49 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8919, &(0x7f0000000040)=0x2) 11:29:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230001c00", 0x1132}) 11:29:49 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb70879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:49 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x80350000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230000500", 0x1132}) 11:29:49 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x891c, &(0x7f0000000040)=0x2) 11:29:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb63879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:49 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8941, &(0x7f0000000040)=0x2) 11:29:49 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x543]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:49 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00#\x00', 0x1132}) 11:29:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xb, 0x1, 0x2a2, &(0x7f0000000000)) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 11:29:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb58879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009e00", 0x1132}) 11:29:50 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:50 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8906, &(0x7f0000000040)=0x2) 11:29:50 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x4305000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb25879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:50 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x891c, &(0x7f0000000040)=0x2) 11:29:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00V\x00', 0x1132}) 11:29:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb6f879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:50 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f000", 0x1132}) 11:29:50 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)="f34dba9f9b3018e3c8ba830c1c0f76e0dbe10d77f617d5dfdf", 0x19}], 0x1, &(0x7f0000000c00)=ANY=[]}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000080)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000300)='gre0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r3, 0x9, 0x9ed975d1a3205ac6}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000300)='gre0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0xff90, &(0x7f0000000200)}, 0xfffffe6d) 11:29:50 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x1100000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:50 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8914, &(0x7f0000000040)=0x2) 11:29:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb23879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 271.176438] device  entered promiscuous mode 11:29:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020feffff7a0af0fff8ffffff79a4f0ff00000000b70600000018d1fe2d64050000000000250404000100ffff0704000000060000b7050000000000006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x4}, 0x28) 11:29:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000a900", 0x1132}) 11:29:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb30879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:51 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x3f00000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:51 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:51 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc0045878, &(0x7f0000000040)=0x2) 11:29:51 executing program 5: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)="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", 0x2761, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000880)="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", 0x2761, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49794de18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3ec4d2e8d443c82fc3435bed4de5d69409a781c863e0fd8a6f868925be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a441a2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0cf816930de3675d34117a44eb0e4f832936da44e63e1160af1acf45db1cdf4bcbbede795db798c61db61e23f") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) recvmsg$kcm(r5, &(0x7f0000000d40)={&(0x7f0000000500)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000580)=""/61, 0x3d}, {&(0x7f00000005c0)=""/33, 0x21}, {&(0x7f0000000600)=""/191, 0xbf}, {&(0x7f0000000a00)=""/239, 0xef}, {&(0x7f0000000b00)=""/157, 0x9d}, {&(0x7f0000000700)=""/30, 0x1e}, {&(0x7f00000007c0)=""/22, 0x16}], 0x7, &(0x7f0000000c40)=""/243, 0xf3, 0x200}, 0x40000000) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000d80)=r7) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r4, 0x0, 0x5, &(0x7f0000000080)="6e72300100"}, 0x30) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x400, 0xc62a, 0x1, 0x1, 0x0, 0x2, 0x20010, 0xe, 0x3, 0x6, 0x2d39, 0x1, 0x0, 0x1, 0x1, 0x1c00000000000, 0x4, 0x8, 0x7, 0x193cfdf7, 0x9, 0x2, 0x7fffffff, 0x80000000, 0x40, 0xff800000000, 0x7, 0x6, 0x8, 0x2, 0x49, 0x4, 0x3f, 0x0, 0xff, 0x9, 0x0, 0x8, 0x0, @perf_config_ext={0x10001, 0x1}, 0x80, 0x7, 0x3, 0x4, 0x8, 0x3, 0x40}, r9, 0xe, r6, 0x9) close(r5) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000140)) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={"6e72300100", 0x2101}) r10 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x9, 0x6, 0x100000001, 0x0, 0x0, 0x0, 0x88200, 0x2, 0x3ff, 0x9cf5, 0x1, 0x80000001, 0x2, 0x5, 0xfff, 0x7, 0x0, 0x5, 0x8, 0x81, 0x4, 0x4, 0x80000001, 0x10000, 0x2, 0x800, 0x4, 0x4, 0xeb, 0x0, 0x0, 0x100, 0x1, 0x0, 0x8001, 0x200, 0x0, 0x80000000, 0x4, @perf_config_ext={0x100, 0x3}, 0x0, 0xc1ec, 0x3, 0x2, 0x3ff, 0x2, 0x3}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x2400, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xf8, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)=@ipx={0x4, 0x0, 0x10001, "8318cfdbc3b2", 0x400}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004010}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000006c0)) socket$kcm(0xa, 0x0, 0x11) socketpair$inet6(0xa, 0xf, 0x6, &(0x7f00000004c0)) sendmsg$kcm(r3, &(0x7f0000002440)={&(0x7f0000000dc0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x80, &(0x7f0000002240)=[{&(0x7f0000000e40)="e5212dee62cd99b2c2e0ea117f54c0905fcd12c9313fb8e55c1b51ce7addc28852747a5532055c4fd97d0e2a25bb75d2e4530c4537d53925ad4af781034ee2b75375d3cc3f6ca8", 0x47}, {&(0x7f0000000ec0)}, {&(0x7f0000000f00)="6b81aa8d9023ca12bdcb1cbcf9ca56919867936fd034528ae2b79a6780bbc9ea963d8e82706053d6442e68fbf3702d0d66ae8b0dd928092846a2ea442ef1c77a27f5c4c3ec4eb56ae083db7849156c5badd91a83894c0ecee0d8ce2bb0243bbc8a9f522f5d96974b279584b8b3f103a8d58c049930f7edc82985f279710899966d7c967d87f4ea92c4d7859544ba3452a5475ee1cc724dabf6f76af933e4612b9f1b4a5411ebdead1262bff77ff1038c544d859dd3c5d45196ba83276d8920ffadb4ce9725ab0ecd", 0xc8}, {&(0x7f0000001000)="2eb39011a230bee8b5f3832cf8038db6a1598571f27f8494c23d04beb6bc5929750dd71f5742c27c4b3c711c2d277409c87032adf54e65f64c8032ed0464049c089f224e8705f1b5ad77a99b66aed927ac2a86a8a65645b72f51ddac61f7b4aa7b0e67a7f44b6a7374ea70e0b2ae6277b8b2ab0d8903971dfe0b81d7ac60", 0x7e}, {&(0x7f0000001080)="a6284e8803e240777fa9948087be24ef5493e7b92359faed32a9939701251cec3229f5448b94b03e4dbeaf7a94902014e0fe13dbf8fdc62aa1fabbbdb3de440f851ee7d383573bb429be9747106ffd1efe7d89fa5a16d45fce6727e667b41da91128d85e692a5111a1941ac3fe2db427e3dcf799627877828dc0dafa98776dd75aa44ab1ceea0062b8b25ecd431f1a9ef0516c69c01d48fee88dc61f562d69656b902bd18188779b479e10ef0c29fd6992ad906fbfce9652bd98", 0xba}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="de16cce982504b6ee0e6a96dceb549c58c7a9e18786e186561facdb74ea92733f5368c7198eb680b3171a98f858f6a83b689c8516abb41975774d9be50bb7af8e0e1ba20b432de07df0a5218455863eb343ba623d1dc939be59313f51cb956ece8f02294a35d6b7669ac20db7306c2a0e15a9f942db6cb143640d2faae8e54074b37582382aa489deb61474f128b2effc86d9248087f397d547539e0a66eb52441f339cbf488e78ee2d60174cbf471511f02e07fe0e5cb3b744b1ececcd68f0fc15e5fed6f6494dec0f2c260e640107f1754068464e98a62963d4ce6562e6003", 0xe0}], 0x7, &(0x7f00000022c0)=[{0x30, 0x11f, 0x1, "cbd21094f41104a3ae813f04fa78dca953e5939ee4a65ae95543"}, {0x90, 0xff, 0x4, "27dcf3b96ca67c09d8e09e3953390743659b8237c3c774574a9c76c40538ff839734b706ce27041f4d63cb1c04d7373e198debd2164a20e3b3b57b294dcbea752a9d3996b3f1c3814b9032af2fa44a9333b4539cd0d4752faaad830bb33008aed9e341ebdd9aafd485675f4da742783f9e932be15c65eeea5d51be20b53655fe"}, {0xa8, 0x10f, 0x6, "1edef989699b8cc10bd4a7c450124f03ffca294f5696bd5cde7df51de6bb21c7052da2c4bcb3ebb8d29e3d15d4ee20ced12384319d7672d8edeacf3d89a242589fd25fc3a6fc33d4f19714b722ca68d8ebe8a8f400dcb3f386fedd620588bccff4355a7f821c37a23febce3de1c4a6fc17d9f49aa0c6052139b70a91eee98bfc5d98be96557ef4c7b0dce8c93a1762d455b832"}], 0x168}, 0x40) 11:29:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb2a879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00H\x00', 0x1132}) 11:29:51 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x4000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e0c0800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:51 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x5452, &(0x7f0000000040)=0x2) 11:29:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e690800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:51 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000a600", 0x1132}) 11:29:51 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xa8050000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e110800", &(0x7f0000000140)=""/41, 0x69}, 0x28) [ 272.172635] net_ratelimit: 1880 callbacks suppressed [ 272.172644] protocol 0800 is buggy, dev ip6_vti0 [ 272.183501] protocol 0800 is buggy, dev ip6_vti0 [ 272.188573] protocol 0800 is buggy, dev ip6_vti0 [ 272.194928] protocol 0800 is buggy, dev ip6_vti0 [ 272.200007] protocol 0800 is buggy, dev ip6_vti0 [ 272.206590] protocol 0800 is buggy, dev ip6_vti0 [ 272.212073] protocol 0800 is buggy, dev ip6_vti0 [ 272.217330] protocol 0800 is buggy, dev ip6_vti0 [ 272.222134] protocol 0800 is buggy, dev ip6_vti0 [ 272.227048] protocol 0800 is buggy, dev ip6_vti0 11:29:52 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8954, &(0x7f0000000040)=0x2) 11:29:52 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) [ 272.505910] ¹á6›Íaï~IyMá‡ì: renamed from nr0 11:29:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb2a879e100800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000fc00", 0x1132}) 11:29:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e2f0800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:52 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xe00]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:52 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8901, &(0x7f0000000040)=0x2) 11:29:52 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x8848]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e020800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:52 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x001\x00', 0x1132}) 11:29:52 executing program 5: r0 = socket$kcm(0xa, 0x804000000000006, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x84) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f00000000c0)='/d') perf_event_open(&(0x7f0000000180)={0x800000000000002, 0x70, 0x3e5, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 11:29:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e0d0800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:52 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xfffffdef]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:53 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:53 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4020940d, &(0x7f0000000040)=0x2) 11:29:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000b700", 0x1132}) 11:29:53 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8901, &(0x7f0000000040)=0x2) 11:29:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e090800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:53 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x5865]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:53 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x34000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e060800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x005\x00', 0x1132}) 11:29:53 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8917, &(0x7f0000000040)=0x2) 11:29:53 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8901, &(0x7f0000000040)=0x2) 11:29:53 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x4888]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:54 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x007\x00', 0x1132}) 11:29:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e040800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:54 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8982, &(0x7f0000000040)=0x2) 11:29:54 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8901, &(0x7f0000000040)=0x2) 11:29:54 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x86ddffff00000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000d700", 0x1132}) 11:29:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e0a0800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:54 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8940, &(0x7f0000000040)=0x2) 11:29:54 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x6000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:54 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8917, &(0x7f0000000040)=0x2) 11:29:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e070800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:55 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00,\x00', 0x1132}) 11:29:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e080800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefff77a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0x50, &(0x7f0000000180)}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000036000000, 0x44, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f00800d5dc57ee41dea43e63a377fb8a977c3f1d1756be5143d84648a27f11c72be0000001e1977d486a72d7363417ef6c9079a2ea9a174e26", &(0x7f00000000c0)=""/41, 0x100, 0x3b8a}, 0x28) 11:29:55 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xffffca88]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:55 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x5451, &(0x7f0000000040)=0x2) 11:29:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e0e0800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009000", 0x1132}) 11:29:55 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x5ac]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e120800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:55 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000040)=0x2) 11:29:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00|\x00', 0x1132}) 11:29:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e050800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:55 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xffffffffa0008000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:55 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:55 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x890c, &(0x7f0000000040)=0x2) 11:29:55 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230000e00", 0x1132}) 11:29:55 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc020660b, &(0x7f0000000040)=0x2) 11:29:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e0b0800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x00s\x00', 0x1132}) 11:29:56 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x5451, &(0x7f0000000040)=0x2) 11:29:56 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x88a8ffff]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:56 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8907, &(0x7f0000000040)=0x2) 11:29:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e030800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230000f00", 0x1132}) 11:29:56 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8940, &(0x7f0000000040)=0x2) 11:29:56 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x806]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:56 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e340800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:56 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x891b, &(0x7f0000000040)=0x2) 11:29:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000f600", 0x1132}) 11:29:56 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8940, &(0x7f0000000040)=0x2) 11:29:56 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x40000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:56 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x8060000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e370800", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:56 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000d900", 0x1132}) 11:29:57 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8934, &(0x7f0000000040)=0x2) 11:29:57 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x891b, &(0x7f0000000040)=0x2) [ 277.310947] net_ratelimit: 2438 callbacks suppressed [ 277.310956] protocol 0800 is buggy, dev ip6_vti0 [ 277.349084] protocol 0800 is buggy, dev ip6_vti0 [ 277.361571] protocol 0800 is buggy, dev ip6_vti0 11:29:57 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x8906]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 277.386815] protocol 0800 is buggy, dev ip6_vti0 [ 277.392544] protocol 0800 is buggy, dev ip6_vti0 [ 277.397966] protocol 0800 is buggy, dev ip6_vti0 [ 277.402964] protocol 0800 is buggy, dev ip6_vti0 [ 277.408322] protocol 0800 is buggy, dev ip6_vti0 [ 277.413351] protocol 0800 is buggy, dev ip6_vti0 [ 277.432134] protocol 0800 is buggy, dev ip6_vti0 11:29:57 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e7230009b00", 0x1132}) 11:29:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e103700", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:57 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40049409, &(0x7f0000000040)=0x2) 11:29:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd980, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x90ffffff}]}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 11:29:57 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x8035000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:57 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES64=r0, @ANYRESOCT=r0, @ANYPTR64, @ANYPTR64, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64, @ANYPTR64], @ANYRES64=r0, @ANYRESHEX=r0]], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x0, 0xbd, 0x63, &(0x7f0000000300)="a2a4df709083e3b3b56851f24fb3258a9c4fd41b26bbf76855700cc25e4ca22205e9873e887960b8c7821ff71b11063d9280c28149f9ebbb41ad070a49cd5dbdb0b86238614b027be9328850d04d3f3e47afaab396a5d1d75f05c6e0a837226de80f60160dec765ea0c89b50cc7959dd9627d58f1e3e3549cbb34de2711268acff83832fe1224b776544d25fd146459ba53f2da322314996515af8768c5197552b3488efa09e9c82e5833452fc939d466859aabf5d3ffa174e46f8ae4e", &(0x7f00000003c0)=""/99, 0x3ff}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 11:29:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e102f00", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:57 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000c000", 0x1132}) 11:29:57 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x100000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:57 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x89a1, &(0x7f0000000040)=0x2) 11:29:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e106558", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:58 executing program 1: r0 = socket$kcm(0x11, 0x3, 0x300) recvmsg$kcm(r0, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) close(0xffffffffffffffff) socket$kcm(0xa, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x70d000) 11:29:58 executing program 5: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x100000000000000, 0x0, 0xa8aaaafffeaaaaaa, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000003900)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7e111a45ab3c0a5512a282636bdd9a8", 0x3c}], 0x1}, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000380)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r1, 0x4) 11:29:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e723000df00", 0x1132}) 11:29:58 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0xac05000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) 11:29:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1088a8", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:58 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x8903, &(0x7f0000000040)=0x2) 11:29:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000140)=""/41, 0x69}, 0x28) 11:29:58 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffff9c, 0x28, &(0x7f00000003c0)={0x0, 0x0}}, 0xfffffffffffffff0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440)={r0, 0x1, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={0x0, 0x80000000}, 0xc) r2 = socket$kcm(0x2, 0x0, 0x84) recvmsg$kcm(r2, &(0x7f00000078c0)={&(0x7f0000005580)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007780)=[{&(0x7f0000005600)=""/201, 0xc9}, {&(0x7f0000005700)=""/4096, 0x1000}, {&(0x7f0000006700)=""/119, 0x77}, {&(0x7f0000006780)=""/4096, 0x1000}], 0x4, &(0x7f00000077c0)=""/248, 0xf8, 0x5}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000007900)={0x9, 0x12, &(0x7f0000000540)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r1}, @jmp={0x5, 0x3, 0x4, 0xf, 0xa, 0xfffffffffffffffc, 0x8}, @ldst={0x3, 0x1, 0x7, 0xf, 0x5, 0x100, 0x4}, @alu={0x4, 0x7, 0xf, 0x5, 0xf, 0x3a, 0x4}, @call={0x85, 0x0, 0x0, 0xa}, @exit, @jmp={0x5, 0x6, 0xf, 0x7, 0x0, 0x8, 0x4}, @jmp={0x5, 0x2, 0x4, 0xd, 0x3, 0x18, 0x1}, @generic={0x0, 0x7ff, 0x5, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x2000000001, 0x44, &(0x7f0000000600)=""/68, 0x41100, 0x1, [], r3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x46, &(0x7f00000001c0)='vmnet1\\-vboxnet0posix_acl_access}cpusetselfkeyringvmnet0(cpusetem0([.\x00'}, 0x30) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0xa002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xffffffff80000001, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuset.memory_pressure\x00', 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)="6576656e7473000000c7aaff0fb0c79b9391e4ae6479d80000000000", 0xf0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000200)={r2}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000140)='vboxnet0wlan0-vboxnet0$\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[@ANYBLOB="0953aef39ccd475d21defd87000100000000000000000000bf00000000000000080000000000000000000000ef410f81636a9be2b07aad6ea2bdb5c5c80529819a3624fbe85dc0a229cdd0f0e8ce8c4e71650caf14c9775646e58598748008dbe16b2db4b4cad8beefdbc3495800219aa48b282858e5c553c914c41a9d881b8fdf053d666a136e0aa38380523b25743e874fc897614b21d4dfe834"]) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x6, 0xfffffffffffffff7, 0x101, 0x34, 0x0, 0x1, 0x1e008, 0x0, 0x9, 0x101, 0x0, 0x7fff, 0x8001, 0x843a, 0x8, 0x8001, 0x1000, 0x9, 0x7, 0x81, 0x76, 0x6, 0x4, 0xca93, 0x800, 0xffffffffffffffff, 0x5f, 0x8001, 0x6, 0x10000, 0x1ff, 0x6, 0xffffffffffffff00, 0x1, 0x7d9, 0xfffffffffffffff7, 0x0, 0x8, 0x0, @perf_config_ext={0x0, 0x10001}, 0x0, 0x1, 0x9b1, 0x7, 0x100000001, 0xa, 0x7}, r5, 0xb, r4, 0x8) r6 = socket$kcm(0x2, 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r6, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) close(r4) socket$kcm(0x2, 0x8000000003, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x89a1, &(0x7f0000000040)=0x2) 11:29:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300f00", 0x1132}) [ 279.087228] ================================================================== [ 279.094828] BUG: KASAN: slab-out-of-bounds in _decode_session6+0x134e/0x1500 [ 279.102060] Read of size 1 at addr ffff8801ce51ff07 by task syz-executor3/20193 [ 279.109511] [ 279.111216] CPU: 0 PID: 20193 Comm: syz-executor3 Not tainted 4.19.0-rc7+ #128 [ 279.118584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.118602] Call Trace: [ 279.118627] dump_stack+0x1c4/0x2b4 [ 279.118651] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.118674] ? printk+0xa7/0xcf [ 279.134230] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 279.134260] print_address_description.cold.8+0x9/0x1ff [ 279.134280] kasan_report.cold.9+0x242/0x309 [ 279.134294] ? _decode_session6+0x134e/0x1500 [ 279.134314] __asan_report_load1_noabort+0x14/0x20 [ 279.134328] _decode_session6+0x134e/0x1500 [ 279.134362] __xfrm_decode_session+0x71/0x140 [ 279.142822] vti6_tnl_xmit+0x3fc/0x1c0e [ 279.142864] ? vti6_rcv+0x8e0/0x8e0 [ 279.142884] ? run_filter+0x420/0x420 [ 279.152996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.153017] ? check_preemption_disabled+0x48/0x200 [ 279.153034] ? check_preemption_disabled+0x48/0x200 [ 279.153081] dev_hard_start_xmit+0x295/0xc90 [ 279.161980] ? dev_direct_xmit+0x6b0/0x6b0 [ 279.162000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.162017] ? netif_skb_features+0x690/0xb70 [ 279.162031] ? unwind_dump+0x190/0x190 [ 279.162054] ? lock_acquire+0x1ed/0x520 [ 279.175775] ? __dev_queue_xmit+0x2fff/0x3950 [ 279.175800] ? lock_release+0x970/0x970 [ 279.175817] ? validate_xmit_skb+0x80c/0xf30 [ 279.175857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.175906] ? check_preemption_disabled+0x48/0x200 [ 279.175932] __dev_queue_xmit+0x2f0d/0x3950 [ 279.175952] ? save_stack+0x43/0xd0 [ 279.187330] ? kasan_kmalloc+0xc7/0xe0 [ 279.202887] ? __kmalloc_node_track_caller+0x47/0x70 [ 279.202904] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 279.202934] ? netdev_pick_tx+0x2d0/0x2d0 [ 279.202951] ? kmem_cache_alloc_node_trace+0x5b0/0x740 [ 279.202985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.211634] ? check_preemption_disabled+0x48/0x200 [ 279.211652] ? check_preemption_disabled+0x48/0x200 [ 279.211680] ? __lock_is_held+0xb5/0x140 [ 279.211704] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 279.221715] ? skb_release_data+0x1c4/0x880 [ 279.221738] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 279.221755] ? kasan_unpoison_shadow+0x35/0x50 [ 279.221772] ? skb_tx_error+0x2f0/0x2f0 [ 279.221800] ? __kmalloc_node_track_caller+0x47/0x70 [ 279.229644] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.229663] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 279.229684] ? kasan_check_write+0x14/0x20 [ 279.229701] ? pskb_expand_head+0x6b3/0x10f0 [ 279.229715] ? find_held_lock+0x36/0x1c0 [ 279.229743] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 279.242612] ? skb_checksum+0x140/0x140 [ 279.242651] ? kasan_check_write+0x14/0x20 [ 279.242666] ? __skb_clone+0x6c7/0xa00 [ 279.242685] ? __copy_skb_header+0x6b0/0x6b0 [ 279.242704] ? kmem_cache_alloc+0x33a/0x730 [ 279.381152] ? skb_ensure_writable+0x15e/0x640 [ 279.385728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.391261] dev_queue_xmit+0x17/0x20 [ 279.395050] ? dev_queue_xmit+0x17/0x20 [ 279.399031] __bpf_redirect+0x5cf/0xb20 [ 279.403013] bpf_clone_redirect+0x2f6/0x490 [ 279.407330] bpf_prog_c39d1ba309a769f7+0xa0c/0x1000 [ 279.412349] ? __sched_text_start+0x8/0x8 [ 279.416507] ? ktime_get+0x352/0x440 [ 279.420244] ? find_held_lock+0x36/0x1c0 [ 279.424343] ? lock_acquire+0x1ed/0x520 [ 279.428330] ? bpf_test_run+0x3cb/0x780 [ 279.432296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.437825] ? check_preemption_disabled+0x48/0x200 [ 279.442852] ? kasan_check_read+0x11/0x20 [ 279.446990] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 279.452270] ? rcu_bh_qs+0xc0/0xc0 [ 279.455842] ? preempt_schedule+0x4d/0x60 [ 279.460013] ? ___preempt_schedule+0x16/0x18 [ 279.464464] ? bpf_test_run+0x25d/0x780 [ 279.468442] ? netlink_diag_dump+0x2a0/0x2a0 [ 279.472852] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.478388] ? bpf_test_init.isra.10+0x70/0x100 [ 279.483059] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 279.487805] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 279.492641] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.498185] ? fput+0x130/0x1a0 [ 279.501472] ? __bpf_prog_get+0x9b/0x290 [ 279.505558] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 279.510389] ? bpf_prog_test_run+0x130/0x1a0 [ 279.514811] ? __x64_sys_bpf+0x3d8/0x520 [ 279.518879] ? bpf_prog_get+0x20/0x20 [ 279.522700] ? do_syscall_64+0x1b9/0x820 [ 279.526761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.532175] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.537109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.541941] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.546946] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.551953] ? prepare_exit_to_usermode+0x291/0x3b0 [ 279.556980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.561822] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.567218] [ 279.568841] Allocated by task 20193: [ 279.572563] save_stack+0x43/0xd0 [ 279.576000] kasan_kmalloc+0xc7/0xe0 [ 279.579710] __kmalloc_node_track_caller+0x47/0x70 [ 279.584663] __kmalloc_reserve.isra.39+0x41/0xe0 [ 279.589405] pskb_expand_head+0x230/0x10f0 [ 279.593634] skb_ensure_writable+0x3dd/0x640 [ 279.598040] bpf_clone_redirect+0x14a/0x490 [ 279.602370] bpf_prog_c39d1ba309a769f7+0xa0c/0x1000 [ 279.607377] [ 279.608990] Freed by task 18944: [ 279.612340] save_stack+0x43/0xd0 [ 279.615779] __kasan_slab_free+0x102/0x150 [ 279.620000] kasan_slab_free+0xe/0x10 [ 279.623792] kfree+0xcf/0x230 [ 279.626898] load_elf_binary+0x25b4/0x5620 [ 279.631123] search_binary_handler+0x17d/0x570 [ 279.635691] __do_execve_file.isra.33+0x162f/0x2540 [ 279.640712] __x64_sys_execve+0x8f/0xc0 [ 279.644689] do_syscall_64+0x1b9/0x820 [ 279.648583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.653758] [ 279.655398] The buggy address belongs to the object at ffff8801ce51fd00 [ 279.655398] which belongs to the cache kmalloc-512 of size 512 [ 279.668039] The buggy address is located 7 bytes to the right of [ 279.668039] 512-byte region [ffff8801ce51fd00, ffff8801ce51ff00) [ 279.680243] The buggy address belongs to the page: [ 279.685160] page:ffffea00073947c0 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 279.693296] flags: 0x2fffc0000000100(slab) [ 279.697532] raw: 02fffc0000000100 ffffea00073977c8 ffffea00074c8408 ffff8801da800940 [ 279.705421] raw: 0000000000000000 ffff8801ce51f080 0000000100000006 0000000000000000 [ 279.713298] page dumped because: kasan: bad access detected [ 279.718999] [ 279.720624] Memory state around the buggy address: [ 279.725544] ffff8801ce51fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 279.732903] ffff8801ce51fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 279.740252] >ffff8801ce51ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 279.747599] ^ [ 279.750970] ffff8801ce51ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 279.758328] ffff8801ce520000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 279.765685] ================================================================== [ 279.773029] Disabling lock debugging due to kernel taint [ 279.778558] Kernel panic - not syncing: panic_on_warn set ... [ 279.778558] 11:29:59 executing program 4: socket$kcm(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0xa, 0x0, 0xa, @dev={0xfe, 0x80, [0x0, 0x806000000000000]}, 0x7}, 0x80, &(0x7f0000000340)}, 0x0) [ 279.785936] CPU: 0 PID: 20193 Comm: syz-executor3 Tainted: G B 4.19.0-rc7+ #128 [ 279.794674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.798421] kobject: 'loop4' (00000000c4f62bdc): kobject_uevent_env [ 279.804029] Call Trace: [ 279.804052] dump_stack+0x1c4/0x2b4 [ 279.804076] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.816339] kobject: 'loop4' (00000000c4f62bdc): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 279.816672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 279.836026] panic+0x238/0x4e7 [ 279.839233] ? add_taint.cold.5+0x16/0x16 [ 279.843396] ? trace_hardirqs_on+0xb4/0x310 [ 279.847745] kasan_end_report+0x47/0x4f [ 279.851728] kasan_report.cold.9+0x76/0x309 [ 279.856053] ? _decode_session6+0x134e/0x1500 [ 279.861062] __asan_report_load1_noabort+0x14/0x20 [ 279.865990] _decode_session6+0x134e/0x1500 [ 279.870306] __xfrm_decode_session+0x71/0x140 [ 279.874791] vti6_tnl_xmit+0x3fc/0x1c0e [ 279.878772] ? vti6_rcv+0x8e0/0x8e0 [ 279.882410] ? run_filter+0x420/0x420 [ 279.886215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.891764] ? check_preemption_disabled+0x48/0x200 [ 279.896778] ? check_preemption_disabled+0x48/0x200 [ 279.901827] dev_hard_start_xmit+0x295/0xc90 [ 279.906255] ? dev_direct_xmit+0x6b0/0x6b0 [ 279.910496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.916043] ? netif_skb_features+0x690/0xb70 [ 279.920538] ? unwind_dump+0x190/0x190 [ 279.924459] ? lock_acquire+0x1ed/0x520 [ 279.928433] ? __dev_queue_xmit+0x2fff/0x3950 [ 279.932934] ? lock_release+0x970/0x970 [ 279.936912] ? validate_xmit_skb+0x80c/0xf30 [ 279.941326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.946888] ? check_preemption_disabled+0x48/0x200 [ 279.951939] __dev_queue_xmit+0x2f0d/0x3950 [ 279.956261] ? save_stack+0x43/0xd0 [ 279.959886] ? kasan_kmalloc+0xc7/0xe0 [ 279.963774] ? __kmalloc_node_track_caller+0x47/0x70 [ 279.968882] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 279.973818] ? netdev_pick_tx+0x2d0/0x2d0 [ 279.977975] ? kmem_cache_alloc_node_trace+0x5b0/0x740 [ 279.983251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.988819] ? check_preemption_disabled+0x48/0x200 [ 279.994033] ? check_preemption_disabled+0x48/0x200 [ 279.999060] ? __lock_is_held+0xb5/0x140 [ 280.003135] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 280.008155] ? skb_release_data+0x1c4/0x880 [ 280.012482] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 280.017759] ? kasan_unpoison_shadow+0x35/0x50 [ 280.022342] ? skb_tx_error+0x2f0/0x2f0 [ 280.026370] ? __kmalloc_node_track_caller+0x47/0x70 [ 280.031473] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.037011] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 280.042551] ? kasan_check_write+0x14/0x20 [ 280.046784] ? pskb_expand_head+0x6b3/0x10f0 [ 280.051192] ? find_held_lock+0x36/0x1c0 [ 280.055263] ? __pskb_copy_fclone+0xeb0/0xeb0 [ 280.059756] ? skb_checksum+0x140/0x140 [ 280.063740] ? kasan_check_write+0x14/0x20 [ 280.067975] ? __skb_clone+0x6c7/0xa00 [ 280.071869] ? __copy_skb_header+0x6b0/0x6b0 [ 280.076276] ? kmem_cache_alloc+0x33a/0x730 [ 280.080604] ? skb_ensure_writable+0x15e/0x640 [ 280.085193] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.090734] dev_queue_xmit+0x17/0x20 [ 280.094533] ? dev_queue_xmit+0x17/0x20 [ 280.098510] __bpf_redirect+0x5cf/0xb20 [ 280.102491] bpf_clone_redirect+0x2f6/0x490 [ 280.106824] bpf_prog_c39d1ba309a769f7+0xa0c/0x1000 [ 280.111859] ? __sched_text_start+0x8/0x8 [ 280.116008] ? ktime_get+0x352/0x440 [ 280.119730] ? find_held_lock+0x36/0x1c0 [ 280.123800] ? lock_acquire+0x1ed/0x520 [ 280.127776] ? bpf_test_run+0x3cb/0x780 [ 280.131766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.137317] ? check_preemption_disabled+0x48/0x200 [ 280.142337] ? kasan_check_read+0x11/0x20 [ 280.146492] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 280.151787] ? rcu_bh_qs+0xc0/0xc0 [ 280.155331] ? preempt_schedule+0x4d/0x60 [ 280.159483] ? ___preempt_schedule+0x16/0x18 [ 280.163901] ? bpf_test_run+0x25d/0x780 [ 280.167891] ? netlink_diag_dump+0x2a0/0x2a0 [ 280.172306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.177841] ? bpf_test_init.isra.10+0x70/0x100 [ 280.182521] ? bpf_prog_test_run_skb+0x73c/0xcb0 [ 280.187284] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 280.192134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.197671] ? fput+0x130/0x1a0 [ 280.200952] ? __bpf_prog_get+0x9b/0x290 [ 280.205014] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 280.209867] ? bpf_prog_test_run+0x130/0x1a0 [ 280.214281] ? __x64_sys_bpf+0x3d8/0x520 [ 280.218340] ? bpf_prog_get+0x20/0x20 [ 280.222164] ? do_syscall_64+0x1b9/0x820 [ 280.226230] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.231596] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.236528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.241376] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.246393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.251413] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.256436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.261284] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.267628] Kernel Offset: disabled [ 280.271254] Rebooting in 86400 seconds..