271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51a", 0xb3}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec17365"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:38 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, 0x0) 08:26:38 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:38 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, 0x0) 08:26:39 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r6 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r6, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r6, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x5, 0x0) r7 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r5}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x8916, &(0x7f0000000000)={r7}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8", 0xd1}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, 0x0) 08:26:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 08:26:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:39 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 08:26:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:39 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 08:26:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8", 0xd1}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) 08:26:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:40 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) r10 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:40 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:40 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) r10 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00'}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r12 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r12, 0x4, r8, 0x1) 08:26:41 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) r10 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8", 0xd1}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r3, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) r10 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265d", 0xe0}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00'}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r12 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r12, 0x4, r8, 0x1) 08:26:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265d", 0xe0}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:42 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:42 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r12 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r12, 0x4, r8, 0x1) 08:26:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:42 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:42 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r12 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r12, 0x4, r8, 0x1) 08:26:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265d", 0xe0}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:43 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8", 0xe7}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2e, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:43 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r3, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:44 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x0, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8", 0xe7}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r0, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:44 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r0, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8", 0xe7}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:44 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x0, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) 08:26:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r3, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:44 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r10 = socket$kcm(0xa, 0x5, 0x0) r11 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r11}, 0x10) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:45 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x0, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r0, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r3, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r0, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x0, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff", 0xeb}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r3, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r0, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x0, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff", 0xeb}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:45 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r0, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:46 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r10 = socket$kcm(0xa, 0x5, 0x0) r11 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r11}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) gettid() 08:26:46 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x0, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff", 0xeb}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:46 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) 08:26:46 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8c", 0xed}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:46 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:46 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:47 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8c", 0xed}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:47 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r10 = socket$kcm(0xa, 0x5, 0x0) r11 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r11}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:47 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8c", 0xed}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:47 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r10 = socket$kcm(0xa, 0x5, 0x0) r11 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r11}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8c", 0xed}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:48 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, 0x0, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x4, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8c", 0xed}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:48 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, 0x0, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:49 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, 0x0, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:49 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fff", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x4, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:49 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r8, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r9, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r10 = socket$kcm(0xa, 0x5, 0x0) r11 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r10, 0x8916, &(0x7f0000000000)={r10}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r11}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) gettid() 08:26:49 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x4, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fff", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:49 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:49 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {0x0}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:50 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:50 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:50 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fff", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:50 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x0) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:50 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:50 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {0x0}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:50 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x0) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:51 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x0, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:51 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:51 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x0) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:51 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) gettid() 08:26:51 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) gettid() 08:26:51 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) gettid() 08:26:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:51 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, 0x0, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {0x0}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:51 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x0) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac14", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:52 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, 0x0, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:52 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, 0x0, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac14", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:52 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:52 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:53 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x0, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1c, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac14", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:53 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:26:53 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:26:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:53 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x0, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:53 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:26:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:53 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x0, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:54 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:26:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) 08:26:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:54 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 08:26:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000500)=0x2) 08:26:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedf", 0x60}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x0, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000500)=0x2) 08:26:55 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedf", 0x60}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, 0x0, 0x4, r8, 0x1) 08:26:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, 0x0, 0x4, r8, 0x1) 08:26:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:56 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) socket$kcm(0x29, 0x5, 0x0) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, 0x0, 0x4, r8, 0x1) 08:26:56 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r0}) 08:26:56 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedf", 0x60}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 289.352043][T19315] FAULT_INJECTION: forcing a failure. [ 289.352043][T19315] name failslab, interval 1, probability 0, space 0, times 1 [ 289.427068][T19315] CPU: 0 PID: 19315 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 289.435005][T19315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.445070][T19315] Call Trace: [ 289.448473][T19315] dump_stack+0x172/0x1f0 [ 289.452927][T19315] should_fail.cold+0xa/0x15 [ 289.457551][T19315] ? fault_create_debugfs_attr+0x180/0x180 [ 289.463389][T19315] ? ___might_sleep+0x163/0x280 [ 289.468275][T19315] __should_failslab+0x121/0x190 [ 289.473238][T19315] should_failslab+0x9/0x14 [ 289.477759][T19315] __kmalloc+0x2e0/0x770 [ 289.482051][T19315] ? mark_held_locks+0xf0/0xf0 [ 289.486871][T19315] ? _parse_integer+0x190/0x190 [ 289.491756][T19315] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 289.497580][T19315] tomoyo_realpath_from_path+0xcd/0x7b0 [ 289.503139][T19315] ? tomoyo_path_number_perm+0x193/0x520 [ 289.508806][T19315] tomoyo_path_number_perm+0x1dd/0x520 [ 289.514273][T19315] ? tomoyo_path_number_perm+0x193/0x520 [ 289.519915][T19315] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 289.525723][T19315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 289.531972][T19315] ? __kasan_check_read+0x11/0x20 [ 289.537035][T19315] ? __fget+0x384/0x560 [ 289.541195][T19315] ? ksys_dup3+0x3e0/0x3e0 [ 289.545604][T19315] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 289.551838][T19315] ? fput_many+0x12c/0x1a0 [ 289.556255][T19315] tomoyo_file_ioctl+0x23/0x30 [ 289.561051][T19315] security_file_ioctl+0x77/0xc0 [ 289.565999][T19315] ksys_ioctl+0x57/0xd0 [ 289.570245][T19315] __x64_sys_ioctl+0x73/0xb0 [ 289.574835][T19315] do_syscall_64+0xfd/0x6a0 [ 289.579466][T19315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.585357][T19315] RIP: 0033:0x4598e9 [ 289.589266][T19315] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.608897][T19315] RSP: 002b:00007efdb4030c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.617321][T19315] RAX: ffffffffffffffda RBX: 00007efdb4030c90 RCX: 00000000004598e9 08:26:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f59649fc9638c1f964b7dbe5c0827d88c25ae1e957fe55d2bf0", 0xbf}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866de45a578a24d431", 0x53}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32=r5, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000500)=0x2) 08:26:56 executing program 4 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) [ 289.625297][T19315] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 289.633278][T19315] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.641545][T19315] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdb40316d4 [ 289.649525][T19315] R13: 00000000004c5863 R14: 00000000004d9fc0 R15: 0000000000000004 [ 289.727687][T19326] FAULT_INJECTION: forcing a failure. [ 289.727687][T19326] name failslab, interval 1, probability 0, space 0, times 1 [ 289.791575][T19326] CPU: 0 PID: 19326 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 289.799531][T19326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.809716][T19326] Call Trace: [ 289.813381][T19326] dump_stack+0x172/0x1f0 [ 289.817749][T19326] should_fail.cold+0xa/0x15 [ 289.822412][T19326] ? fault_create_debugfs_attr+0x180/0x180 [ 289.828252][T19326] ? page_to_nid.part.0+0x20/0x20 [ 289.833309][T19326] ? ___might_sleep+0x163/0x280 [ 289.838199][T19326] __should_failslab+0x121/0x190 [ 289.843188][T19326] should_failslab+0x9/0x14 [ 289.847730][T19326] __kmalloc+0x2e0/0x770 [ 289.851995][T19326] ? __fget+0xa3/0x560 [ 289.856101][T19326] ? retint_kernel+0x2b/0x2b [ 289.860708][T19326] ? trace_hardirqs_on_caller+0x6a/0x240 [ 289.866457][T19326] ? bpf_test_init.isra.0+0x95/0x100 [ 289.871763][T19326] bpf_test_init.isra.0+0x95/0x100 [ 289.876893][T19326] bpf_prog_test_run_skb+0x10f/0x1310 [ 289.882407][T19326] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 289.887969][T19326] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 289.894392][T19326] ? fput_many+0x12c/0x1a0 [ 289.898829][T19326] ? fput+0x1b/0x20 [ 289.902635][T19326] ? __bpf_prog_get+0x97/0x290 [ 289.907408][T19326] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 289.912957][T19326] __do_sys_bpf+0x1668/0x3460 [ 289.917651][T19326] ? bpf_prog_load+0x1660/0x1660 [ 289.922632][T19326] ? __this_cpu_preempt_check+0x3a/0x210 [ 289.928273][T19326] ? retint_kernel+0x2b/0x2b [ 289.932873][T19326] ? retint_kernel+0x2b/0x2b [ 289.937468][T19326] ? trace_hardirqs_on_caller+0x6a/0x240 [ 289.943108][T19326] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 289.948589][T19326] __x64_sys_bpf+0x73/0xb0 [ 289.953016][T19326] do_syscall_64+0xfd/0x6a0 [ 289.957526][T19326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.963509][T19326] RIP: 0033:0x4598e9 [ 289.967406][T19326] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.987099][T19326] RSP: 002b:00007f5e5281fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 289.995518][T19326] RAX: ffffffffffffffda RBX: 00007f5e5281fc90 RCX: 00000000004598e9 [ 290.003492][T19326] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 290.011464][T19326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.019462][T19326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e528206d4 [ 290.027467][T19326] R13: 00000000004bfc2b R14: 00000000004d1938 R15: 0000000000000005 08:26:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb4614107", 0x90}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 290.053320][T19315] ERROR: Out of memory at tomoyo_realpath_from_path. 08:26:57 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r0}) 08:26:57 executing program 4 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) 08:26:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:57 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedf", 0x60}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 290.313082][T19345] FAULT_INJECTION: forcing a failure. [ 290.313082][T19345] name failslab, interval 1, probability 0, space 0, times 0 [ 290.452372][T19345] CPU: 0 PID: 19345 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 290.460321][T19345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.470393][T19345] Call Trace: [ 290.473715][T19345] dump_stack+0x172/0x1f0 [ 290.478083][T19345] should_fail.cold+0xa/0x15 [ 290.482711][T19345] ? fault_create_debugfs_attr+0x180/0x180 [ 290.488548][T19345] ? ___might_sleep+0x163/0x280 [ 290.493433][T19345] __should_failslab+0x121/0x190 [ 290.498482][T19345] should_failslab+0x9/0x14 [ 290.502992][T19345] __kmalloc+0x2e0/0x770 [ 290.507325][T19345] ? snprintf+0xbb/0xf0 [ 290.511493][T19345] ? vsprintf+0x40/0x40 [ 290.515684][T19345] ? tomoyo_encode2.part.0+0xf5/0x400 [ 290.521060][T19345] tomoyo_encode2.part.0+0xf5/0x400 [ 290.526421][T19345] tomoyo_encode+0x2b/0x50 [ 290.530850][T19345] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 290.536503][T19345] ? tomoyo_path_number_perm+0x193/0x520 [ 290.542152][T19345] tomoyo_path_number_perm+0x1dd/0x520 [ 290.547620][T19345] ? tomoyo_path_number_perm+0x193/0x520 [ 290.553258][T19345] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 290.559098][T19345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 290.565361][T19345] ? __kasan_check_read+0x11/0x20 [ 290.570406][T19345] ? __fget+0x384/0x560 [ 290.574577][T19345] ? ksys_dup3+0x3e0/0x3e0 [ 290.579000][T19345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 290.585257][T19345] ? fput_many+0x12c/0x1a0 [ 290.589684][T19345] tomoyo_file_ioctl+0x23/0x30 [ 290.594462][T19345] security_file_ioctl+0x77/0xc0 [ 290.599493][T19345] ksys_ioctl+0x57/0xd0 [ 290.603660][T19345] __x64_sys_ioctl+0x73/0xb0 [ 290.608262][T19345] do_syscall_64+0xfd/0x6a0 [ 290.612919][T19345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.618843][T19345] RIP: 0033:0x4598e9 [ 290.622751][T19345] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.642548][T19345] RSP: 002b:00007efdb4030c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.651066][T19345] RAX: ffffffffffffffda RBX: 00007efdb4030c90 RCX: 00000000004598e9 [ 290.659461][T19345] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 290.668497][T19345] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.677050][T19345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdb40316d4 [ 290.686933][T19345] R13: 00000000004c5863 R14: 00000000004d9fc0 R15: 0000000000000004 08:26:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) [ 290.837245][T19345] ERROR: Out of memory at tomoyo_realpath_from_path. [ 290.912049][T19364] FAULT_INJECTION: forcing a failure. [ 290.912049][T19364] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 290.925389][T19364] CPU: 1 PID: 19364 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 290.933646][T19364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.943993][T19364] Call Trace: [ 290.947336][T19364] dump_stack+0x172/0x1f0 [ 290.951694][T19364] should_fail.cold+0xa/0x15 [ 290.956315][T19364] ? fault_create_debugfs_attr+0x180/0x180 [ 290.962238][T19364] ? __bpf_address_lookup+0x310/0x310 [ 290.967815][T19364] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 290.973556][T19364] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 290.979135][T19364] should_fail_alloc_page+0x50/0x60 [ 290.984453][T19364] __alloc_pages_nodemask+0x1a1/0x900 [ 290.989845][T19364] ? kernel_text_address+0x73/0xf0 [ 290.994971][T19364] ? __alloc_pages_slowpath+0x2520/0x2520 [ 291.000701][T19364] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 291.006638][T19364] ? __kasan_check_read+0x11/0x20 [ 291.006658][T19364] ? fault_create_debugfs_attr+0x180/0x180 [ 291.006672][T19364] cache_grow_begin+0x90/0xd20 [ 291.006690][T19364] ? bpf_test_init.isra.0+0x95/0x100 [ 291.006714][T19364] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.035169][T19364] __kmalloc+0x6b2/0x770 [ 291.035183][T19364] ? __fget+0xa3/0x560 [ 291.035202][T19364] ? bpf_test_init.isra.0+0x95/0x100 [ 291.035214][T19364] bpf_test_init.isra.0+0x95/0x100 [ 291.035231][T19364] bpf_prog_test_run_skb+0x10f/0x1310 [ 291.035249][T19364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.035263][T19364] ? cap_capable+0x205/0x270 [ 291.035275][T19364] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 291.035286][T19364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.035299][T19364] ? fput_many+0x12c/0x1a0 [ 291.035310][T19364] ? fput+0x1b/0x20 [ 291.035328][T19364] ? __bpf_prog_get+0x97/0x290 [ 291.035348][T19364] ? bpf_test_finish.isra.0+0x4e0/0x4e0 [ 291.102497][T19364] __do_sys_bpf+0x1668/0x3460 [ 291.107200][T19364] ? bpf_prog_load+0x1660/0x1660 [ 291.112155][T19364] ? __kasan_check_write+0x14/0x20 [ 291.117273][T19364] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 291.122831][T19364] ? wait_for_completion+0x440/0x440 [ 291.128133][T19364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.134389][T19364] ? fput_many+0x12c/0x1a0 [ 291.138915][T19364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.145131][T19364] __x64_sys_bpf+0x73/0xb0 [ 291.149586][T19364] do_syscall_64+0xfd/0x6a0 [ 291.154102][T19364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.160002][T19364] RIP: 0033:0x4598e9 [ 291.163905][T19364] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.184388][T19364] RSP: 002b:00007f5e527fec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 291.193018][T19364] RAX: ffffffffffffffda RBX: 00007f5e527fec90 RCX: 00000000004598e9 [ 291.201793][T19364] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a 08:26:58 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r0}) 08:26:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb4614107", 0x90}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 291.210053][T19364] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 291.218137][T19364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5e527ff6d4 [ 291.226416][T19364] R13: 00000000004bfc2b R14: 00000000004d1938 R15: 0000000000000004 [ 291.334168][T19372] FAULT_INJECTION: forcing a failure. [ 291.334168][T19372] name failslab, interval 1, probability 0, space 0, times 0 [ 291.407490][T19372] CPU: 0 PID: 19372 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 291.415448][T19372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.425766][T19372] Call Trace: [ 291.429094][T19372] dump_stack+0x172/0x1f0 [ 291.433543][T19372] should_fail.cold+0xa/0x15 [ 291.438145][T19372] ? fault_create_debugfs_attr+0x180/0x180 [ 291.443975][T19372] ? ___might_sleep+0x163/0x280 [ 291.450496][T19372] __should_failslab+0x121/0x190 [ 291.455964][T19372] should_failslab+0x9/0x14 [ 291.460485][T19372] __kmalloc+0x2e0/0x770 [ 291.465086][T19372] ? snprintf+0xbb/0xf0 [ 291.469421][T19372] ? vsprintf+0x40/0x40 [ 291.473777][T19372] ? tomoyo_encode2.part.0+0xf5/0x400 [ 291.479241][T19372] tomoyo_encode2.part.0+0xf5/0x400 [ 291.484610][T19372] tomoyo_encode+0x2b/0x50 [ 291.489018][T19372] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 291.494739][T19372] ? tomoyo_path_number_perm+0x193/0x520 [ 291.500385][T19372] tomoyo_path_number_perm+0x1dd/0x520 [ 291.506032][T19372] ? tomoyo_path_number_perm+0x193/0x520 [ 291.511671][T19372] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 291.517477][T19372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.523731][T19372] ? __kasan_check_read+0x11/0x20 [ 291.528772][T19372] ? __fget+0x384/0x560 [ 291.532926][T19372] ? ksys_dup3+0x3e0/0x3e0 [ 291.537338][T19372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 291.543842][T19372] ? fput_many+0x12c/0x1a0 [ 291.548278][T19372] tomoyo_file_ioctl+0x23/0x30 [ 291.553077][T19372] security_file_ioctl+0x77/0xc0 [ 291.558026][T19372] ksys_ioctl+0x57/0xd0 [ 291.562188][T19372] __x64_sys_ioctl+0x73/0xb0 [ 291.566864][T19372] do_syscall_64+0xfd/0x6a0 [ 291.571458][T19372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.577352][T19372] RIP: 0033:0x4598e9 [ 291.581246][T19372] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:26:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb4614107", 0x90}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 291.601498][T19372] RSP: 002b:00007efdb4030c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.609911][T19372] RAX: ffffffffffffffda RBX: 00007efdb4030c90 RCX: 00000000004598e9 [ 291.618137][T19372] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 291.626280][T19372] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.634255][T19372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdb40316d4 [ 291.642231][T19372] R13: 00000000004c5863 R14: 00000000004d9fc0 R15: 0000000000000004 08:26:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb4614107", 0x90}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) [ 291.931646][T19372] ERROR: Out of memory at tomoyo_realpath_from_path. 08:26:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0xfffffffffffffffd) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:26:59 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r0}) 08:26:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 292.290338][T19402] FAULT_INJECTION: forcing a failure. [ 292.290338][T19402] name failslab, interval 1, probability 0, space 0, times 0 [ 292.372369][T19402] CPU: 1 PID: 19402 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 292.380318][T19402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.390402][T19402] Call Trace: [ 292.393727][T19402] dump_stack+0x172/0x1f0 [ 292.398095][T19402] should_fail.cold+0xa/0x15 [ 292.402732][T19402] ? fault_create_debugfs_attr+0x180/0x180 [ 292.408582][T19402] ? page_to_nid.part.0+0x20/0x20 [ 292.414091][T19402] ? ___might_sleep+0x163/0x280 [ 292.419228][T19402] __should_failslab+0x121/0x190 [ 292.424192][T19402] should_failslab+0x9/0x14 [ 292.428713][T19402] kmem_cache_alloc_trace+0x2d3/0x790 [ 292.434206][T19402] ? blocking_notifier_call_chain+0x5e/0xb0 [ 292.440198][T19402] ipv6_add_addr+0x367/0x1c80 [ 292.444989][T19402] ? lock_downgrade+0x920/0x920 [ 292.449918][T19402] ? ipv6_mc_up+0x9b/0xc0 [ 292.454267][T19402] ? trace_hardirqs_on+0x67/0x240 [ 292.459404][T19402] ? ipv6_mc_up+0x9b/0xc0 [ 292.463923][T19402] ? inet6_netconf_get_devconf+0xb30/0xb30 [ 292.470555][T19402] ? ipv6_find_idev+0xf0/0x210 [ 292.475535][T19402] inet6_addr_add+0x41a/0x970 [ 292.480337][T19402] ? inet6_addr_add+0x41a/0x970 [ 292.485563][T19402] addrconf_add_ifaddr+0x148/0x1c0 [ 292.490705][T19402] ? addrconf_set_dstaddr+0x460/0x460 [ 292.496119][T19402] ? __lockdep_free_key_range+0x120/0x120 [ 292.502033][T19402] ? rwlock_bug.part.0+0x90/0x90 [ 292.506997][T19402] ? debug_check_no_obj_freed+0xc0/0x43f [ 292.512718][T19402] inet6_ioctl+0xa5/0x1c0 [ 292.517158][T19402] sock_do_ioctl+0xd8/0x2f0 [ 292.521854][T19402] ? compat_ifr_data_ioctl+0x160/0x160 [ 292.527603][T19402] ? trace_hardirqs_on+0x67/0x240 [ 292.532724][T19402] ? tomoyo_path_number_perm+0x459/0x520 [ 292.538557][T19402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.544945][T19402] ? tomoyo_path_number_perm+0x263/0x520 [ 292.550616][T19402] sock_ioctl+0x3ed/0x780 [ 292.554970][T19402] ? dlci_ioctl_set+0x40/0x40 [ 292.559779][T19402] ? __kasan_check_read+0x11/0x20 [ 292.565016][T19402] ? dlci_ioctl_set+0x40/0x40 [ 292.569799][T19402] do_vfs_ioctl+0xdb6/0x13e0 [ 292.574511][T19402] ? ioctl_preallocate+0x210/0x210 [ 292.579647][T19402] ? __fget+0x384/0x560 [ 292.583836][T19402] ? ksys_dup3+0x3e0/0x3e0 [ 292.588314][T19402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.594601][T19402] ? fput_many+0x12c/0x1a0 [ 292.599042][T19402] ? tomoyo_file_ioctl+0x23/0x30 [ 292.604023][T19402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.610817][T19402] ? security_file_ioctl+0x8d/0xc0 [ 292.616136][T19402] ksys_ioctl+0xab/0xd0 [ 292.620409][T19402] __x64_sys_ioctl+0x73/0xb0 [ 292.625260][T19402] do_syscall_64+0xfd/0x6a0 [ 292.629812][T19402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.635739][T19402] RIP: 0033:0x4598e9 [ 292.639654][T19402] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.659843][T19402] RSP: 002b:00007efdb4030c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:26:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) 08:26:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f5964", 0xa8}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:26:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) [ 292.670111][T19402] RAX: ffffffffffffffda RBX: 00007efdb4030c90 RCX: 00000000004598e9 [ 292.678531][T19402] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 292.686546][T19402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.686554][T19402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdb40316d4 [ 292.686560][T19402] R13: 00000000004c5863 R14: 00000000004d9fc0 R15: 0000000000000004 08:26:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005f77f4f42d6ef886a557fd5d31472eba7be617735271dcd597ceac3b2afb616c27469b5cb733c51d21263809b67f4e41e844a1c5cb1daf43c8ac12d44c0afeee67fdc976d1bc951646d4b4c180c03ee3978cf43800268c60a5d4cd14b6b267a8c54d9e931a308adf329760990fdde02c94aaaed5f6fefd028e978c281439b63b3983f8136694444ed36569a2cb21c3272efd4d1c8069a973aa86bef55f82b325672ebf7ec91165513d4c670d7a6e49d4a23a5de6ac7f0ef8ac0e8c79fd328d459f26637464ac6646c1009098572bbf3c881ad802aee86187eeb24af873230634353ecf58557ee14ff66582d2979815053ca51b38b1741f6b861d9ec173655a28"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedf", 0x60}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:27:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) 08:27:00 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r0}) 08:27:00 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzoaller\x00', 0x1, 0xfffffe98, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x14}, 0x10}, 0x70) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9fe80110180000000000e3ff47000000999b8f74064229cc09000000223a9957a5b633a20000070000011348000000010000ff001c0013d20200000000000000fb0000000000000001000000040000ed1a001000000000000c040000000667b410988638521bf8a67f"], &(0x7f0000001f00)=""/4096, 0x65, 0x1000}, 0x20) socketpair(0x4, 0x80000, 0xe2, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x0, 0x7, 0x1, &(0x7f0000000000)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) r4 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r0, &(0x7f0000000600)='cpuacct.stat\x00', 0x0, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x37a, 0x56, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x6, 0x0, 0x7d38, 0x10001, 0x40, 0x9, 0x0, 0xff, 0x0, 0x80000001, 0x0, 0x0, 0x1, 0x2, 0x1, 0x7f, 0x3f, 0x829d, 0x0, 0x0, 0x6, 0x4, 0x0, 0x300000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8cd, 0x0, 0x2, 0x81, 0x0, 0x80}, r7, 0x9, 0xffffffffffffffff, 0x2) r8 = perf_event_open(0x0, r7, 0x4000d, r4, 0x8) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x0) r9 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x21000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, r9, 0x0, 0xa, &(0x7f0000000840)='syzoaller\x00'}, 0x30) perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0xb3, 0x6, 0x1, 0x0, 0x0, 0xffffffff00000000, 0xa0200, 0x1, 0xb1f, 0x101, 0x9, 0x4, 0x0, 0x553e, 0x1, 0x0, 0x9, 0x7, 0x80000000, 0x4, 0x3f, 0x1, 0x0, 0x44bf, 0x9, 0x1, 0x9, 0x3, 0x8001, 0x80, 0x8, 0x40, 0x8, 0x5, 0x2, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x1000, 0x400, 0xfffffffffffffff7, 0x6, 0x1f, 0x5, 0x4}, r10, 0x9, r5, 0x4d27d6751146d25c) r11 = socket$kcm(0xa, 0x5, 0x0) r12 = openat$cgroup_ro(r6, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, r6}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x8916, &(0x7f0000000000)={r11}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r12}, 0x10) socketpair(0x8, 0x1, 0x0, &(0x7f0000000380)) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f00000016c0)=@in6={0xa, 0x4e20, 0x0, @empty}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[@timestamping={{0x14, 0x1, 0x25, 0x101}}], 0x18}, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x70, 0x4, 0xffffffff, 0x3, 0x1, 0x0, 0x3, 0x1e044, 0x2, 0xfffffffffffff800, 0x8001, 0x81, 0x9, 0x4, 0x6, 0x0, 0x5, 0x1, 0x689, 0x7bbd, 0x4, 0x9, 0x2, 0x1c000000000000, 0xfffffffffffffeff, 0x7, 0x1ff, 0x2, 0x2, 0x1, 0x39, 0x5, 0x3ff, 0x7, 0xffffffffffffffc1, 0x7096, 0xe3, 0x0, 0x4, 0x7, @perf_bp={&(0x7f0000000540), 0x1}, 0x2000, 0x0, 0x80, 0x0, 0x80, 0x7, 0xffff}, r5, 0x10, r8, 0x1) unlink(&(0x7f00000006c0)='./file0\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x24f, 0x6, 0x4, 0x3, 0x0, 0x4e0, 0x42000, 0x6, 0x8000, 0x7, 0x0, 0xaa2, 0x0, 0x8, 0x7, 0x6, 0x2, 0x9, 0x89, 0x8, 0x6, 0x1ff, 0xf5a8, 0xffffffffffffff00, 0xcd, 0x2, 0x3d, 0x2, 0x4, 0x4, 0x8, 0x0, 0x401, 0x5, 0x9, 0x5, 0x0, 0x1ff, 0x3, @perf_config_ext={0x48f7, 0x4}, 0x800, 0x6, 0x7, 0x2, 0x1e, 0x3, 0x8}, 0xffffffffffffffff, 0x5, r9, 0xa) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r13 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x6, 0x101, 0x1f, 0x0, 0x0, 0x8, 0x10004, 0x1, 0x0, 0x9, 0x6, 0x4e, 0x9, 0x2fc, 0x9, 0x100000001, 0x5, 0xfff, 0x80000000000000, 0x800, 0x3ff, 0x8000, 0x100, 0x6, 0x2126d7b5, 0x81, 0x8000, 0x0, 0x0, 0x7, 0x300000000000, 0xffff, 0xe572, 0x0, 0x1, 0x71ec, 0x0, 0x5, 0x0, @perf_config_ext={0xd6f}, 0x4000, 0x9, 0x4, 0x8, 0x6, 0x0, 0x763c}, r13, 0x4, r8, 0x1) 08:27:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f5964", 0xa8}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:27:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) [ 293.257352][T19438] FAULT_INJECTION: forcing a failure. [ 293.257352][T19438] name failslab, interval 1, probability 0, space 0, times 0 [ 293.299436][T19438] CPU: 1 PID: 19438 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 293.307556][T19438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.319015][T19438] Call Trace: [ 293.322430][T19438] dump_stack+0x172/0x1f0 [ 293.326897][T19438] should_fail.cold+0xa/0x15 [ 293.331616][T19438] ? fault_create_debugfs_attr+0x180/0x180 [ 293.337449][T19438] ? page_to_nid.part.0+0x20/0x20 [ 293.342612][T19438] ? ___might_sleep+0x163/0x280 [ 293.347493][T19438] __should_failslab+0x121/0x190 [ 293.352462][T19438] should_failslab+0x9/0x14 [ 293.356982][T19438] kmem_cache_alloc_trace+0x2d3/0x790 [ 293.362369][T19438] ? inet6_addr_add+0x41a/0x970 [ 293.367783][T19438] fib6_info_alloc+0xb6/0x1b0 [ 293.372648][T19438] ip6_route_info_create+0x2fe/0x1530 [ 293.378075][T19438] ? addrconf_f6i_alloc+0xb9/0x4a0 [ 293.383480][T19438] addrconf_f6i_alloc+0x307/0x4a0 [ 293.388507][T19438] ? ipv6_route_ioctl+0x350/0x350 [ 293.393633][T19438] ? kasan_kmalloc+0x9/0x10 [ 293.398219][T19438] ? kmem_cache_alloc_trace+0x346/0x790 [ 293.403852][T19438] ? blocking_notifier_call_chain+0x5e/0xb0 [ 293.409743][T19438] ipv6_add_addr+0x3aa/0x1c80 [ 293.414514][T19438] ? lock_downgrade+0x920/0x920 [ 293.419708][T19438] ? ipv6_mc_up+0x9b/0xc0 [ 293.424130][T19438] ? trace_hardirqs_on+0x67/0x240 [ 293.429408][T19438] ? ipv6_mc_up+0x9b/0xc0 [ 293.433788][T19438] ? inet6_netconf_get_devconf+0xb30/0xb30 [ 293.439593][T19438] ? ipv6_find_idev+0xf0/0x210 [ 293.444356][T19438] inet6_addr_add+0x41a/0x970 [ 293.449035][T19438] ? inet6_addr_add+0x41a/0x970 [ 293.454500][T19438] addrconf_add_ifaddr+0x148/0x1c0 [ 293.459984][T19438] ? addrconf_set_dstaddr+0x460/0x460 [ 293.465981][T19438] ? __lockdep_free_key_range+0x120/0x120 [ 293.472498][T19438] ? rwlock_bug.part.0+0x90/0x90 [ 293.478322][T19438] ? debug_check_no_obj_freed+0xc0/0x43f [ 293.483998][T19438] inet6_ioctl+0xa5/0x1c0 [ 293.488368][T19438] sock_do_ioctl+0xd8/0x2f0 [ 293.492916][T19438] ? compat_ifr_data_ioctl+0x160/0x160 [ 293.498416][T19438] ? trace_hardirqs_on+0x67/0x240 [ 293.503489][T19438] ? tomoyo_path_number_perm+0x459/0x520 [ 293.509189][T19438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.515682][T19438] ? tomoyo_path_number_perm+0x263/0x520 [ 293.521462][T19438] sock_ioctl+0x3ed/0x780 [ 293.525839][T19438] ? dlci_ioctl_set+0x40/0x40 [ 293.531230][T19438] ? __kasan_check_read+0x11/0x20 [ 293.536596][T19438] ? dlci_ioctl_set+0x40/0x40 [ 293.543041][T19438] do_vfs_ioctl+0xdb6/0x13e0 [ 293.548028][T19438] ? ioctl_preallocate+0x210/0x210 [ 293.553331][T19438] ? __fget+0x384/0x560 [ 293.557817][T19438] ? ksys_dup3+0x3e0/0x3e0 [ 293.562366][T19438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 293.568614][T19438] ? fput_many+0x12c/0x1a0 [ 293.573119][T19438] ? tomoyo_file_ioctl+0x23/0x30 [ 293.578106][T19438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.585245][T19438] ? security_file_ioctl+0x8d/0xc0 [ 293.590549][T19438] ksys_ioctl+0xab/0xd0 [ 293.597075][T19438] __x64_sys_ioctl+0x73/0xb0 [ 293.603542][T19438] do_syscall_64+0xfd/0x6a0 [ 293.608519][T19438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.614427][T19438] RIP: 0033:0x4598e9 [ 293.618445][T19438] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.638616][T19438] RSP: 002b:00007efdb4030c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:27:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) [ 293.647029][T19438] RAX: ffffffffffffffda RBX: 00007efdb4030c90 RCX: 00000000004598e9 [ 293.655025][T19438] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 293.662995][T19438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 293.671143][T19438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdb40316d4 [ 293.679107][T19438] R13: 00000000004c5863 R14: 00000000004d9fc0 R15: 0000000000000004 08:27:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)) openat$cgroup_ro(r1, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r2, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:27:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) 08:27:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000840)=""/42, 0x2a}], 0x1, &(0x7f00000008c0)=""/249, 0xf9}, 0x20) sendmsg(r1, &(0x7f0000001100)={&(0x7f0000000a00)=@ll={0x11, 0x2, r2, 0x1, 0x20, 0x6, @local}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000a80)="998cd39c51bdfc3c6baf56feb0c86c37d3db9bc5858497c5622097cdff23303f8839486f55abbeb4acd3d4b6a2", 0x2d}, {&(0x7f0000000ac0)="6600a3eddf6ab4c6ea90b507a70a94e6ee82c420df3fd3ba230cd2f4d07dae7cb7f41453026544cc7d8ce4a082a016779d58061fc7b6bef27f48ae12f6c907fb89bd8d99b6149242b5a30f7f816cc7c2454749c29e579db0dddc63af84586acbb676f3d5f5a7f3aba689f58b4c9d1e37ee6cf538cd93275f0a73987dc9cf7ec03f53c1b3fd4d6b425304044898e464c7682d99a700cf3c5be8f298e4620e8547e9c4d8f2dd93389f2942888e2afba9f13ca8c49b41b2a6e01835136e615c3a8504f70721a2737f27250f4a4deff1fc781233b893bb428dcead311fea749b85faed919b665199fda5f8dc432469147b", 0xef}, {&(0x7f0000000bc0)="3f960389b6ccb2c31ecac85d6e7276390fd3737a599cc4a0ffadf9cca0c659e8b0244b3348c92f2b79bdbf77f5a135ee48a07b11300553c288bfe06f60a14b4379d114be1da66d0c138b4a94d9eaf573cc3732fa36e9f514b93b15ab8413aedfdbacf05310e944674b0032fb908b619519b207bc1484a403b9a7f4502040f85d04422b9eb877891a3cdba1afb46141079620e8431fb27fb5bb69c403a3cf660b143ef8f89b7f5964", 0xa8}, {&(0x7f0000000c80)="7f97b9320305eb5bafb7db8180adb2586f45208985f6f40905128f2389743737339f9270e681a24ff3611e3f4bb356bbe87949711889bf8ffeea89aa2934640e7218ae3566c6e4bd1e35016ade665863fbe4fde1ef35aabf8fec14b9009c430d84e7a4fba0999abc8af7a1b78b51dd2c70bce1f7a4ca3bfbc839a58f2d088a995e784d9cb5a9c139874ca6337de608ff56ac847fc705d913ae7ad461233de222e2f0aee3bdcacb5cde469bea1451cdbb16a51afb79f96ff30bc6e27e0d26b6f8f2db77389177f78924a2ccd8340db006a8706a35046dbbbf7bb72752ba47265dd6a6359efb2ec8b132ccff2d8cf3", 0xee}, {&(0x7f0000000d80)="8b3a502268e421352a4e65de953f5cb4a6d8b669885da2eeeab013a2e467aa9573435fbbf89137f9ceeecaed75e680eb97a42bfc1e74bdd984d2ce764b2834849fe1e574eac93b335829866d", 0x4c}], 0x5, &(0x7f0000000e80)=[{0xb8, 0x104, 0x2, "abb7d878ee550eb8c7273d13a2019a16a2c5151602a40b1cca7118b107bde680030fca0bebe78aae876fb3eb44e5986efd8b8e28c3b5b0964e339220c96fdc325b1d4678f8cd2a4e037474f3bc7d0c880d783743e5cfa1711ded4a9b3310569c3c8d7284bc77c4287e0df5d3c57618ee5f6e4a26f3b72f6a0168176c56c7320923e1cafb1936d7f98544181baddec5c4c516d84218f9055354a21cc5877f59570d"}, {0xc0, 0x0, 0x8, "0d68a0951e63747fb86d69161dc5b6b0faf7484719c82b7cb9222f51f30f2aa970a62693494eeacc79f8d432e7ae2f30d28396cec40b4a24e1b88839c17d5338da8b8a212c201f3a4a14b32dc753ee75042c41637e63b0fadf8146ed07faaf230422f1a6d85bddbbde634a04c59449a7ebc6fa71df372b4a0c0a0ca91dabedfb8de83ff1851374f54bad3bdaebccc7ba6742ffcd11b76fa318e852b49a1ff85dc785d7e1f4e191840c5cb6ec60"}, {0x100, 0x10c, 0x4, "686ceda55f8e86d6ede6df41943d41372d0c1e7902bbc9369846b0f1e6d5d056131462ee7f680f90951ff7f025aa57bf9674bc53be24a0b9c2ff24ac35714945dedd1c2ca78028b6c559a8a9614906f14df57f114824f9a2f5ffdb24b73b395eed78276075ddff43c4d7b1f03b239001bcf3b1ac54f4bfe75fb621acce03b383ef3935b74fea0e00ea78f9e16d75faaa4552a969bb05c0abe02b7f56ddac677041a32f36e85816b8cc0a4389f60a571a19823c2435d7b80e51076bcc87191bba99b46f9b44d2b45e371dd146e6098462276980c8e62def796447b51cc49167f9e8df14e86f321553349fc1998af1"}], 0x278}, 0x44c0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000500)=0x2) openat$cgroup_ro(r3, &(0x7f0000000480)='pids.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="0000080000000000090f010100000000"], &(0x7f0000000280)='GPL\x00', 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa, 0x6cd4c55d, 0x100}, 0x10}, 0x70) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 08:27:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) [ 294.079149][T19438] kasan: CONFIG_KASAN_INLINE enabled [ 294.084709][T19438] kasan: GPF could be caused by NULL-ptr deref or user memory access 08:27:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) 08:27:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) sendmsg(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000bc0)}], 0x2}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000500)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x14, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x1, 0x75, &(0x7f00000002c0)=""/117, 0xd0c08107fce7ab96, 0x4, [], 0x0, 0x5, r1, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xa}, 0x10}, 0x70) [ 294.404642][T19438] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 294.411653][T19438] CPU: 0 PID: 19438 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 294.419590][T19438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.429857][T19438] RIP: 0010:addrconf_f6i_alloc+0x32d/0x4a0 [ 294.436458][T19438] Code: 59 bc ff ff 48 85 c0 49 89 c4 74 3d e8 dc 36 32 fb 49 8d bc 24 86 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 1f 01 00 00 [ 294.456169][T19438] RSP: 0018:ffff8880642476a0 EFLAGS: 00010206 [ 294.462251][T19438] RAX: dffffc0000000000 RBX: 1ffff1100c848ed6 RCX: ffffc900109de000 [ 294.470538][T19438] RDX: 000000000000000f RSI: ffffffff86403e74 RDI: 000000000000007a [ 294.478544][T19438] RBP: ffff888064247820 R08: ffff8880a805e0c0 R09: fffffbfff11cae6f [ 294.486621][T19438] R10: fffffbfff11cae6e R11: ffffffff88e57373 R12: fffffffffffffff4 [ 294.494612][T19438] R13: ffff8880a23fe000 R14: ffff888064247a60 R15: 0000000000000000 [ 294.502597][T19438] FS: 00007efdb4031700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 294.511541][T19438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 294.518228][T19438] CR2: 00007ffc8c1bcd1c CR3: 00000000a676b000 CR4: 00000000001406f0 [ 294.526345][T19438] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 294.534368][T19438] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 294.542498][T19438] Call Trace: [ 294.545832][T19438] ? ipv6_route_ioctl+0x350/0x350 [ 294.551008][T19438] ? kasan_kmalloc+0x9/0x10 [ 294.555541][T19438] ? kmem_cache_alloc_trace+0x346/0x790 [ 294.561122][T19438] ? blocking_notifier_call_chain+0x5e/0xb0 [ 294.567057][T19438] ipv6_add_addr+0x3aa/0x1c80 [ 294.571763][T19438] ? lock_downgrade+0x920/0x920 [ 294.576659][T19438] ? ipv6_mc_up+0x9b/0xc0 [ 294.581042][T19438] ? trace_hardirqs_on+0x67/0x240 [ 294.586531][T19438] ? ipv6_mc_up+0x9b/0xc0 [ 294.591063][T19438] ? inet6_netconf_get_devconf+0xb30/0xb30 [ 294.597029][T19438] ? ipv6_find_idev+0xf0/0x210 08:27:01 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f00800", 0x0, 0x100, 0x6000000000000000}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpu.stOt\x00fR\x92 \xc5J\xb6\xe4$\xf8w\x002\xb5{\x86My~\x1c\xebw\xba\xabn5\xdc(\xe4\x12\xd5\xfe1C\xb7s>?\xed\x13h\xf4]nQ\xc1\x1cR\x90$\x82_1l\xa7\xcb;\xf2\xe2b2\xf3\xb0ID\xd1\x00q\xaf<\x8e\x12\x9d\x95\x9aX\xfe\xde\t\xb9g\xc6\x0f\'\xbc\x96\xca\xb7\">E\x87w\x92\xa2\xaaCy\xe1\x1f\x9f$k\xc2\x15Gy\x03\xd1f\xed\xe0\xec\xba^\xb2G\xd5\xde_\x1fE\x1c\xe1P\xc3\x006%*Q\xeey\xe21PMR\x0f\xddo\xca.\x1a\x82\x8e\x90\x11a!K\xa8\x99\xd7\xd7\xa0V6\x87\xde\xcfz[\aQ\xf8gkG8\xea\x9d\xa4Tv\xb2p\xde\xb3OV6_\xb6\x81', 0x0, 0x0) [ 294.601831][T19438] inet6_addr_add+0x41a/0x970 [ 294.607057][T19438] ? inet6_addr_add+0x41a/0x970 [ 294.611938][T19438] addrconf_add_ifaddr+0x148/0x1c0 [ 294.617084][T19438] ? addrconf_set_dstaddr+0x460/0x460 [ 294.622499][T19438] ? __lockdep_free_key_range+0x120/0x120 [ 294.628251][T19438] ? rwlock_bug.part.0+0x90/0x90 [ 294.633220][T19438] ? debug_check_no_obj_freed+0xc0/0x43f [ 294.638888][T19438] inet6_ioctl+0xa5/0x1c0 [ 294.643281][T19438] sock_do_ioctl+0xd8/0x2f0 [ 294.647816][T19438] ? compat_ifr_data_ioctl+0x160/0x160 [ 294.653300][T19438] ? trace_hardirqs_on+0x67/0x240 [ 294.658468][T19438] ? tomoyo_path_number_perm+0x459/0x520 [ 294.664211][T19438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 294.670514][T19438] ? tomoyo_path_number_perm+0x263/0x520 [ 294.676187][T19438] sock_ioctl+0x3ed/0x780 [ 294.680573][T19438] ? dlci_ioctl_set+0x40/0x40 [ 294.685368][T19438] ? __kasan_check_read+0x11/0x20 [ 294.690410][T19438] ? dlci_ioctl_set+0x40/0x40 [ 294.695194][T19438] do_vfs_ioctl+0xdb6/0x13e0 [ 294.699961][T19438] ? ioctl_preallocate+0x210/0x210 [ 294.705081][T19438] ? __fget+0x384/0x560 [ 294.709232][T19438] ? ksys_dup3+0x3e0/0x3e0 [ 294.713642][T19438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 294.719915][T19438] ? fput_many+0x12c/0x1a0 [ 294.724345][T19438] ? tomoyo_file_ioctl+0x23/0x30 [ 294.729283][T19438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.735554][T19438] ? security_file_ioctl+0x8d/0xc0 [ 294.740755][T19438] ksys_ioctl+0xab/0xd0 [ 294.744907][T19438] __x64_sys_ioctl+0x73/0xb0 [ 294.749497][T19438] do_syscall_64+0xfd/0x6a0 [ 294.753998][T19438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.759885][T19438] RIP: 0033:0x4598e9 [ 294.763774][T19438] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.783370][T19438] RSP: 002b:00007efdb4030c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.791776][T19438] RAX: ffffffffffffffda RBX: 00007efdb4030c90 RCX: 00000000004598e9 [ 294.799739][T19438] RDX: 0000000020000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 294.807787][T19438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.815940][T19438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efdb40316d4 [ 294.823999][T19438] R13: 00000000004c5863 R14: 00000000004d9fc0 R15: 0000000000000004 [ 294.831975][T19438] Modules linked in: [ 294.837541][ T3908] kobject: 'loop4' (00000000f66ef11f): kobject_uevent_env [ 294.856816][ T3908] kobject: 'loop4' (00000000f66ef11f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 294.867428][T19438] ---[ end trace 0ac513a9819962da ]--- [ 294.887960][T19438] RIP: 0010:addrconf_f6i_alloc+0x32d/0x4a0 [ 294.891739][ T3908] kobject: 'loop1' (0000000045cdae2b): kobject_uevent_env [ 294.898512][T19438] Code: 59 bc ff ff 48 85 c0 49 89 c4 74 3d e8 dc 36 32 fb 49 8d bc 24 86 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 1f 01 00 00 [ 294.928547][ T3908] kobject: 'loop1' (0000000045cdae2b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 294.940461][T19438] RSP: 0018:ffff8880642476a0 EFLAGS: 00010206 [ 294.948624][T19438] RAX: dffffc0000000000 RBX: 1ffff1100c848ed6 RCX: ffffc900109de000 [ 294.957441][T19438] RDX: 000000000000000f RSI: ffffffff86403e74 RDI: 000000000000007a [ 294.966936][T19438] RBP: ffff888064247820 R08: ffff8880a805e0c0 R09: fffffbfff11cae6f [ 294.975916][T19438] R10: fffffbfff11cae6e R11: ffffffff88e57373 R12: fffffffffffffff4 [ 294.977459][ T3908] kobject: 'loop2' (0000000084c6a77d): kobject_uevent_env [ 294.989583][T19438] R13: ffff8880a23fe000 R14: ffff888064247a60 R15: 0000000000000000 [ 295.006785][T19438] FS: 00007efdb4031700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 295.013931][ T3908] kobject: 'loop2' (0000000084c6a77d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 295.018897][T19438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 295.032009][ T3908] kobject: 'loop3' (000000001a6344c5): kobject_uevent_env [ 295.034512][T19438] CR2: 00007ffad77b0000 CR3: 00000000a676b000 CR4: 00000000001406e0 [ 295.040165][ T3908] kobject: 'loop3' (000000001a6344c5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 295.054597][T19438] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 295.062586][ T3908] kobject: 'loop1' (0000000045cdae2b): kobject_uevent_env [ 295.067668][T19438] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 295.073601][ T3908] kobject: 'loop1' (0000000045cdae2b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 295.082083][T19438] Kernel panic - not syncing: Fatal exception [ 295.099701][T19438] Kernel Offset: disabled [ 295.104083][T19438] Rebooting in 86400 seconds..